In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.
A modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify t
... Show MoreA modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify the va
... Show MoreBackground: Hypertension is a major global health concern that increases the risk of cardiovascular disease. Understanding the impact of age and treatment types on blood pressure control is essential for optimizing therapeutic strategies. Aim: This study aims to assess how different treatment types and patient age influence blood pressure control in hypertensive patients. Methodology: A binary logistic regression model was employed to analyze data from 48 patients diagnosed with hypertension. The study investigated the impact of two treatment regimens and patient age on the likelihood of achieving optimal blood pressure levels. The statistical significance of the findings was evaluated using chi-square tests and p-values. Results: T
... Show MoreThe antimicrobial activity of ginger extracts ( cold-water, hot-water, ethanolic and essential oil ) against some of pathogenic bacteria ( Escherichia coli , Salmonella sp , Klebsiella sp , Serratia marcescens, Vibrio cholerae , Staphylococcus aureus , Streptococcus sp) was investigated using Disc diffusion method , and the results were compared with the antimicrobial activity of 12 antibiotics on the same bacteria . The results showed that the ginger extracts were more effective on gram-positive bacteria than gram-negative . V. cholerae and S. marcescens,were the most resistant bacteria to the extracts used , while highest inhibition was noticed against Streptococcus sp (28 mm) . The ethanolic extract showed the broadest antibacterial ac
... Show MoreInfluence of metal nanoparticles synthesized by microorganisms upon soil-borne microscopic fungus Aspergillus terreus K-8 was studied. It was established that the metal nanoparticles synthesized by microorganisms affect the enzymatic activity of the studied culture. Silver nanoparticles lead to a decrease in cellulase activity and completely suppress the amylase activity of the fungus, while copper nanoparticles completely inhibit the activity of both the cellulase complex and amylase. The obtained results imply that the large-scale use of silver and copper nanoparticles may disrupt biological processes in the soil and cause change in the physiological and biochemical state of soil-borne microorganisms as well.
ABSTRACT: BACKGROUND: Estrogens has traditionally been known as the female hormone, but this idea has been challenged in early 1990’s and an essential physiological role for estrogen in male fertility was identified. Phytoestrogens are naturally occurring non-steroidal plant chemicals that can act like the female hormone estrogen. The herbs ( anise alfalfa and vervain ) chosen in this study contain phytoestrogens. OBJECTIVE: Previous studies demonstrated controversy of the effects of phytoestrogens on the rat testes .Hence, the present investigation was undertaken to investigate the influence of typical dose of herbs containing phytoestrogen on the rat testis. MATERIALS AND METHODS: Twenty-four apparently normal mature male rats we
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreThe toxicity of insecticide dichlorvos (90%) was tested in ovaries of mosquito fish using three sublethal concentrations (0.3, 0.6, 0.8 µg/L) and studied their effects on the means of body and ovary weights, gonadosomatic index, ovum size and ova number. Results showed that there was a significant (P<0.05) decrease in body and ovary weights, ovum size and ova count. However, there was no significant (P<0.05) difference in gonadosomatic index in treated groups with the three concentrations of dichlorvos compared with the control group. This study was added evidence on the ovular toxicity of dichlorvos concerning its effect on fish production as well as reduction in the means of productive offspring and their survival.