In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreAn experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative , flowery growth , yield and its components in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1= cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses)
... Show MoreTo understand what the arts in general, and plastic arts in particular, have to do, it is necessary to know how they perform, not only that, but also to know their history, which we should understand at least in general terms. Which in turn gives an image of the standards of taste prevailing in each age, and some of the social and historical relationship of each era, and the cultural expression of that era, which is shown in the arts. We need to understand that the arts of each stage, although different from each other, yet remain interrelated in what we see through the effects that appear through the succession of times, which creates certain artistic traditions, inherited by one generation after the other. The research in this field de
... Show MoreCensure in poetry is a pattern of poetic construction, in which the poet evokes a voice other than his own voice or creates out of his own self another self and engages with him in dialogue in the traditional artistic style whose origin remains unknown. Example of the same may be found in the classical Arabic poets’ stopping over the ruins, crying over separation and departure and speaking with stones and andirons; all in the traditional technical mould. Censure confronting the poet usually emanates from the women as blaming, censure and cursing is closer to woman’s hearts than to the man’ hearts. Censure revolves around some social issues, such as the habit of over drinking wine and extravagant generosity taking risks, traveling,
... Show MoreThe principle in the language is that each word has one meaning. This is because the purpose of language development is for understanding, understanding, and communication between people. The language is sounds with which each people expresses their Arabic language did not stop at this point, but rather needed another next stage or to convey additional features or characteristics that would qualify it. To be the language of the Qur’an and revelation, and capable of carrying this heavy burden.
This study Arabic dialect prevailing in the province of Khuzestan [southwest Islamic Republic of Iran] as one of the Arabic dialects abundant qualities and characteristics of linguistic entrenched in the foot, which includes among Tithe thousands composed of vocabulary and structures and phrases classical that live up to the pre-Islamic era, if what Tasha researcher and reflect accurately the find of a large number of phrases and vocabulary and acoustic properties by nature accent, and formal, and nature of the synthetic, and characteristics semantic and contextual in this dialect studied without being something of them heavy on the tongue and without displays her tune or Tasha or distortion and so on all of which constitute a catalyst i
... Show MoreResumen The article deals with the analysis of different ways of creating Arabic scientific terminology. Arabic scientific style includes the terminology that represents different scientific areas functioning in all Arabic countries. These ways can be classified as: giving the meaning of terms; construction of new terms according to the rules of word formation; reduction and ellipsis of terms; direct term borrowing, all the above-mentioned being subject to further analysis. Main objectives of academic style, the specific features and certain lexical and grammatical peculiarities of the Arabic scientific terminology are under consideration as well. Discussed in the paper are linguistic and extra-linguistic factors influencing the ways of sci
... Show MoreSpelling correction is considered a challenging task for resource-scarce languages. The Arabic language is one of these resource-scarce languages, which suffers from the absence of a large spelling correction dataset, thus datasets injected with artificial errors are used to overcome this problem. In this paper, we trained the Text-to-Text Transfer Transformer (T5) model using artificial errors to correct Arabic soft spelling mistakes. Our T5 model can correct 97.8% of the artificial errors that were injected into the test set. Additionally, our T5 model achieves a character error rate (CER) of 0.77% on a set that contains real soft spelling mistakes. We achieved these results using a 4-layer T5 model trained with a 90% error inject
... Show MoreThis research is intended to high light the uses of political content in foreign Arabic / speaking websites, such as “ CNN “ and” Euro News“, The research problem stems from the main question: What is the nature of the use of the websites in the political content provided through them? A set of sub-questions that give the research aspects and aims to achieve a set of objectives , including the identification of topics that included , the political content provided through , the sample sites during the time period for analysis and determine that the study uses descriptive research based on the discovery of the researcher, describing it accurately and defining the relations between the components.
The research conducted the des
Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser
... Show More