Preferred Language
Articles
/
PRdyXo8BVTCNdQwCVHTq
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.

Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Impact of Hindiya Dam on the Limnological Features of Euphrates River to the North of Babil Governorate, Iraq
...Show More Authors

          Five sites were chosen to the north of Babil Governorate in   order to identify the limnological features and the impact of the Hindiya Dam during 2019. Site2 was located near the dam to reflect the ecological features of this site, whereas other sites, S1 was located at the upstream of the dam as a control site. Moreover, the two other sites S3 and S4 were located down the dam. The results of  the  study  showed  a  close  correlation  between air and water temperature at all sites. Also there were significant differences in average of thirteen out of eighteen water parameters.Water temperature, total alkalinity, bicarbonate, DO, POS, TH and Mg+2  ions  decreased from 22.76˚C, 203.33 mg/L,

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction
...Show More Authors

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Fri Sep 24 2021
Journal Name
Journal Of The College Of Education For Women
Arabic Language Teachers’ Training Needs for Implementing Cognitive Trips Strategy when Teaching Arabic Language Courses in the Kingdom of Saudi Arabia: أمل ناصر الحربي, و وفاء العويضي
...Show More Authors

The present work focuses on examining the strategy of cognitive trips and the Arabic language teachers’ training needs of such a strategy when teaching Arabic language courses in the Saudi Arabia Kingdom. To achieve the objective of the study, and check whether this strategy is used in lesson planning, lesson teaching, or lesson assessment, a descriptive approach and a questionnaire have been adopted. The researchers used a number of statistical tools, and chose a purposive sample, which consists of (58) Arabic language teachers from Saudi Arabia Kingdom. Results have shown that the training needs of Arabic language teachers for implemining the strategy of cognitive journeys while teaching Arabic language courses came in the following

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Features experimentation in theater Iraqi academic: يوسف هاشم عباس
...Show More Authors

1.Chapter I (systematic framework) which includes: the research problem and the importance of the research, the need for it, the goals of the research, the temporal &spatial boundaries, determine the terms and defined procedurally.2.Chapter II - the theoretical framework: It consists of three sections are:•The first topic:- the concept of references and experimentation in the theater. •The second topic:- the director of academic and experimentation in Iraq. Two paragraphs in this section came after the introduction, in first paragraph to talk about the Iraqi theater academic and experimentation, and in the second paragraph the researcher spoke about the academic director of the Iraqi and experimentation. 3.Chapter III - Actions -

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Electro Cardiographic Features of Ptients With Tetralogy of Fallot
...Show More Authors

Background: For many decades, the ECG was the
workhorse of non-invasive cardiac test and today although
other techniques provide more details about the structural
anomalies in congenital heart diseases, ECG is likely to be
part of clinical evaluation of patients with such diseases
because it is inexpensive, easy to perform and in certain
situations may be both sensitive and specific.
Objective: this study carried out to identify the pattern of
ECG study in patients with TOF.
Methods: this is a retrospective study of 200 patients
with TOF, referred to Ibn Al-Bitar cardiac center from
April 1993 to May 1999. The diagnosis of TOF established
by echocrdiographic, catheterization and angiographic
study.

... Show More
View Publication Preview PDF
Publication Date
Wed May 18 2016
Journal Name
Al-academy
Actor performance features in the types of theatrical silent
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Employ 6D-BIM Model Features for Buildings Sustainability Assessment
...Show More Authors
Abstract<p>To translate sustainable concepts into sustainable structure, there is a require a collaborative work and technology to be innovated, such as BIM, to connect and organize different levels of industry e.g. decision-makers, contractors, economists, architects, urban planners, construction supplies and a series of urban planning and strategic infrastructure for operate, manage and maintain the facilities. This paper will investigate the BIM benefits as a project management tool, its effectiveness in sustainable decision making, also the benefit for the local industry key stakeholders by encouraging the BIM use as a project management tool to produce a sustainable building project. This p</p> ... Show More
View Publication
Scopus (15)
Crossref (12)
Scopus Crossref