Preferred Language
Articles
/
PRdyXo8BVTCNdQwCVHTq
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.

Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
A Contrastive Study on the Syntactic Structure of Standard English and Standard Arabic Determiner Phrase
...Show More Authors

The determiner phrase is a syntactic category that appears inside the noun phrase and makes it definite or indefinite or quantifies it. The present study has found wide parametric differences between the English and Arabic determiner phrases in terms of the inflectional features, the syntactic distribution of determiners and the word order of the determiner phrase itself. In English, the determiner phrase generally precedes the head noun or its premodifying adjectival phrase, with very few exceptions where some determiners may appear after the head noun. In Arabic, parts of the determiner phrase precede the head noun and parts of it must appear after the head noun or after its postmodifying adjectival phrase creating a discontinu

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Math Word Problems in Mathematics Books for the First Three Grads of the Basic Stage in Palestine (An analytical and Evaluative Study)
...Show More Authors

This study aimed at revealing the degree of availability of standards of word problems in mathematics books for the first three grades of the basic stage in Palestine. For this purpose, the researcher prepared an analysis tool and a list of criteria consisting of two areas: linguistic formulation and mathematical content. Every area had seven items. The results of the study showed that the third-grade mathematics book has the highest degree of availability of the standards with 85.75%, and then came the second-grade mathematics book with 83.12%. Finally, the first-grade mathematics book came with 80.13%. In the light of the previous results, the researcher recommended to develop the language of word problems, to take into account their i

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Construction of the School Physical Environment Standardized Features Tool
...Show More Authors

Objective: A descriptive design, using the methodological approach, is carried throughout the present
study from April 1st 2012 to May 20th 2013 to construct the school physical environment standardized
features tool.
Methodology: An instrument of (141) item is constructed for the purpose of the study. A purposive
sample of (44) school; (22) public and (22) private ones is selected. Content Validity of the instrument is
determined through the use of panel of (11) expert who are specialists in Community Health Nursing and
Community Medicine. Internal consistency reliability, using the split-half technique, is employed through
the computation of Cronbach alpha correlation coefficient of (0.93) for internal scale. Data

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
Methods of computer word formation in the modern Russian language: Способы словообразования в сфере компьютерных неологизмов в современном русском языке
...Show More Authors

This paper discusses the study of computer Russian language neologisms. Problems of studying computer terminology are constantly aggravated by the processes of computer technology that is introduced to all walks of life. The study identifies ways of word formation: the origin of the computer terms and the possibility of their usage in Russian language. The Internet is considered a worldwide tool of communication used extensively by students, housewives and professionals as well The Internet is a heterogeneous environment consisting of various hardware and software configurations that need to be configured to support the languages used. The development of Internet content and services is essential for expanding Internet usage. Some of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2013
Journal Name
Al–bahith Al–a'alami
WHAT IS DEMOCRACY? A MEDIA CONCEPT: (Socio-Cultural Linguistic Analysis)
...Show More Authors

 

It is easy to talk about democracy, but it is difficult to practice. We talk about postmodernism, but difficult to be embodied in the ground. Yet, the age of democracy and modernity at the same time prompted the researcher to try to find a media concept for it. It does not mean that this concept has not yet formed. But the rooting of democracy and the approaching of states and groups towards it, made it necessary to by studied again.

The relationship between democracy and the media has made them look like one concept. The existence of one is linked to the existence of the other. The reality is only a linguistic formulation, but the social and cultural aspect is related to democracy origin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Alustath Journal For Human And Social Sciences
The Impact of Mind and Informational Strategy on the ‎Achievement of the Second Intermediate Students in the Grammar ‎of Arabic Language
...Show More Authors

The aim of the current research is to recognizing the impact of mind and informational strategy on the achievement with the second intermediate students in the grammar of arabic language, the researcher used a partial-set experimental design and intentionally selected a sample out of the second intermediate class from (AL- Markazya Intermediate school) in the district of Hilla, affiliated which belongs to General Directorate of Babylon Education in the year (2020-2021) for applying the experiment. The sample was composed of (50) students, (25) ones for each group, the experimental group and normal one. The researcher balanced between the two groups in various changes including: (the chronological age counted by months, the academic achie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 27 2019
Journal Name
Al-academy
The Arabic Calligraphy Effectiveness and Implications in Industrial Products Design: صلاح نوري محمود
...Show More Authors

Arabic calligraphy has a special status as one of the most important oriental arts, which has been enhanced by the Islamic value. The Arabic fonts have been diverse in their classification into soft lines such as Diwani, thuluth and patch lines and others, and geometrical lines such as Kufic lines and their various types. The contemporary artist was also able to adapt the Arabic calligraphy of all kinds in the construction of the painting or line formations, especially after the development of the artistic digital techniques and computer software. Here comes the role of the industrial designer as being more in touch with the practical, technical and productive life, which requires great care in adapting the line formations of the Arabic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Features of the approach the Great Prophet Muhammad in Education
...Show More Authors

God sent the Prophet Muhammad as a teacher and promising harbinger {that is sent to the illiterate messenger reciting to them His signs and purifies them and teaches them the Book and Wisdom} [Friday: 2]; the wisdom of Baos Prophet him peace be and am back to teach people, - Education and therefore his life was very rich educational tactics And has passed the Prophet in different circumstances and conditions that can be experienced by a teacher or educator in any time, anywhere; there is no case of going through the educator or teacher only finds the same or similar or likened to, or close to it in the life of the Prophet peace be upon him Prophet has lived God's peace be upon his strengths and weaknesses, victory and defeat, he lived or

... Show More
View Publication Preview PDF