In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.
The importance of the Arabic language and its deep vocabulary in the live translation of the work of science and interior design can't be hidden from the whole world. The previous studies have dealt with the role of the linguistic vocabulary and Arabic calligraphy in interior spaces in terms of decoration and design. However, this research sheds light on the importance of linguistic vocabulary in the construction of design thought and how it has become the a basic motivation in the process of scientific and practical construction and not just aesthetic formations that took their place in the interior spaces, as linguistic vocabulary emerged recently and echoed within the specialization of interior design and formed a key motive to explor
... Show MoreAbstract:
Purpose\The researcher paper aims to determine the impact of information technology on the job performance, for Iraq private ban as through the use of technology dimensions of job performance.
The aim of this research: this study aims to discuss the importance of information technology and its role in achieving job performance and its impact on the Iraq banking sector design/ methodology/ approach used entrance design/methodology/approach- pilot, the questionnaire was used to collect data in order to develop a model to measure reliably and correctly to the variables of information technology and job performance, and hypotheses were tested through the use of some statisti
... Show MoreThe laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show MoreThis paper aims to early study of detection and diagnosis of kidney tumors and kidney stones using Computed Tomography Scanning CT scan images by digital image processing. Computerized Axial Tomography (CAT) is a special medical imaging technique that provides images with 3D, including much information about the body's construction consisting of bones and organs. A C.T scan uses X-rays to create cross-sectional images of the body and gives the doctor a full explanation of the diagnosis of the situation through the examination. It has been used in five cases of kidney images, including healthy, stones, tumors (cancer), cystic and renal fibrosis. The masking procedure is used to separate the required C.T. images
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreLayer by layer development two features of pulsed laser deposition PLD, with a high kinetic energy and sharp instantaneous deposition rating. Layered films of polymer/metal/ceramic nanocomposites consisting of polystyrene PS(as substrate) , tin Sn and cadmium oxide CdO were deposited by PLD. Structure for layered samples were measured by XRD X ray diffraction, there were appearance of peaks which reflected to formation of new compounds result of reaction between layers. Particles size was calculated using two methods and it give nanoscale. Microstrain was also calculated and exhibited high value (0.01) for sample p/m.
Measuring goat weight on a farm is carried out by two methods. The first method conventionally measures the chest girth (CG) and body length (BL), while the second is performed using a scale. This study aimed to facilitate the CG and BL measurements to estimate goat weight more efficiently through image processing. The endpoints of CG and BL were determined automatically using binary large object (BLOB) segmentation. The images of 120 goats were taken at three different shooting distances of 50 cm, 70 cm, and 90 cm. The statistical testing of the three scenarios in this study explained that the ideal distance to take pictures is the basis for determining whether or not the size of the circumference and BL is appropriate as a fea
... Show MoreThe need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services
... Show More