Preferred Language
Articles
/
PRdyXo8BVTCNdQwCVHTq
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harnesses the unique attributes of this language, encompassing its complex character designs, diacritical marks, and ligatures, to effectively protect information. In this work, we propose a new text steganography method based on Arabic language characteristics concealment, where the proposed method has two levels of security which are: Arabic encoding and word shifting. In the first step, build a new Arabic encoding mapping table to convert an English plaintext to Arabic characters, then use a word shifting process to add an authentication phase for the sending message and add another level of security to the achieved ciphertext. The proposed method showed that Arabic language characteristics steganography achieved 0.15 ms for 1 k, 1.0033 ms for 3 k, 2.331 ms for 5 k, and 5.22 ms for 10 k file sizes respectively.

Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Meanings of Colours as a Medium Reflecting the World Linguistic Image: Значение цветов как способ отражения языковой картины мира
...Show More Authors

 The paper sheds light on the meanings of colours as a significant  medium reflecting the world linguistic image which represents the culture of any country since language is closely related with culture. Language goes hand in hand with people's daily expressions, specifically those cultural ones. Language is a way to store historical and cultural information, and is a means of transferring the experience of a group to outside groups. 

The world linguistic image identifies the standards of human behavior in dependence upon the human view of the surrounding world, along with the type of behavior with which the world interacts and to whose challenges and effects it responds. So, multi-cultural people perceive the sam

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Revista Iberoamericana De PsicologÍa Del Ejercicio Y El Deporte
SPECIAL EXERCISES IN THE HIERARCHICAL OPPOSING TRAINING METHOD AND ITS EFFECT ON DEVELOPING PHYSICAL ABILITIES AND ACCURACY OF SOCCER SCORING FOR ADVANCED PLAYERS
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
La réception du Petit Prince de Saint-Exupéry dans le monde arabe The impact of The Little Prince on Arabic audience
...Show More Authors

Le Petit Prince est apparu en 1943 vers la fin de la vie de son auteur. La mondialité qu'a gagnée ce récit le rend un des livres les plus lus et les plus vendus dans le monde. Cette popularité en fait un des classiques de la littérature française.

En effet la littérature française a un impact profond et direct sur la vie intellectuelle et littéraire dans le monde arabe. La circulation des œuvres littéraires écrites en français a bien influencé les lecteurs arabes soit en langue française  soit  traduites en arabe. Cette réalité est identique lorsqu'on parle de la réception du Petit Prince ; l'œuvre la plus connue dans le monde entier dès son apparition officielle.

Ab

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 11 2019
Journal Name
Day 3 Wed, November 13, 2019
Drill Bit Selection Optimization Based on Rate of Penetration: Application of Artificial Neural Networks and Genetic Algorithms
...Show More Authors
Abstract<p>The drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the</p> ... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Sat Oct 31 2020
Journal Name
International Journal Of Intelligent Engineering And Systems
Automatic Computer Aided Diagnostic for COVID-19 Based on Chest X-Ray Image and Particle Swarm Intelligence
...Show More Authors

View Publication
Scopus (23)
Crossref (5)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Design and implementation monitoring robotic system based on you only look once model using deep learning technique
...Show More Authors

<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in

... Show More
View Publication
Scopus (12)
Crossref (4)
Scopus Crossref
Publication Date
Mon May 01 2023
Journal Name
Journal Of Engineering
Optimization of Inventory Inflation Budget Based on Spare-parts and Miscellaneous Costs of a Typical Automobile Industry
...Show More Authors

Brainstorming has been a common approach in many industries where the result is not always accurate, especially when procuring automobile spare parts. This approach was replaced with a scientific and optimized method that is highly reliable, hence the decision to optimize the inventory inflation budget based on spare parts and miscellaneous costs of the typical automobile industry. Some factors required to achieve this goal were investigated. Through this investigation, spare parts (consumables and non-consumables) were found to be mostly used in Innoson Vehicle Manufacturing (IVM), Nigeria but incorporated miscellaneous costs to augment the cost of spare parts. The inflation rate was considered first due to the market's

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Laser
Design and Implementation Tunable Band Pass Filter based on PCF-Air Micro-cavity FBG Fabry-Perot Resonator
...Show More Authors

A tunable band pass filter based on fiber Bragg grating sensor using an in-fiber Mach-Zender interferometer with dual micro-cavities is presented. The micro-cavity was formed by splicing together a conventional single-mode fiber and a solid core photonic crystal fiber (SCPCF) with simple arc discharge technique. Different parameters such as arc power, length of the SCPCF and the overlap gap between samples were considered to control the fabrication process. The ellipsoidal air-cavity between the two fibers forms Fabry-Perot cavity. The diffraction loss was very low due to short cavity length. Ellipsoidal shape micro-cavities were experimentally achieved parallel to the propagation axis having dimensions of (24.92 – 62.32) μm of width

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Sun May 15 2022
Journal Name
Revistabionatura
Synthesis and characterization of azo liquid crystal compounds based on 5H-Thiazolo [3,4-b][1,3,4] thiadiazole unit
...Show More Authors

A calamitic symmetric liquid crystalline consisting of an azo group containing 5H-Thiazolo[3,4-b][1,3,4]thiadiazole moiety compound[III] was synthesized via sequence reactions starting from reaction terephthaldehyde with mercaptoacetic acid and thiosemicarbazide in the presence of concentrated sulfuric acid to synthesized 5,5'-(1,4-phenylene)bis(5Hthiazolo[4,3-b][1,3,4]thiadiazol-2-amine)[I] then the azo compound [II] synthesized by coupling between diazonium salt of the compound [I] with phenol at (0-4) ̊C., after that the compound [III] was synthesized by the reaction of the compound [II] with methyl bromide in alkaline media. The compounds are characterized by melting points, FTIR and 1HNMR spectroscopy. The mesomorphic behavior was stu

... Show More
Preview PDF