Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers. The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.
This study analyzes how to make use of the resources in the marshlands of Iraq and how to utilize them, especially after the water returns to these areas and they are revitalized. We take an example of AL- Saheen Marsh and plan an ideal tourist resort there. This example can further expand to include other parts of the marshlands. The resort will utilize the local environment and tourist characteristics as it will have a feel and architectural resemblance to the houses and buildings that are currently built there. In addition the transportation methods will be the same as those used by the locals. Yet the resort will still posses all the facilities required by a modern tourist resort that includes all the services that will make
... Show MoreThis study deals with an important area in the field of linguistics, namely person deixis.
The study aims at: (1) Describing the notion of deixis, its importance, and its place in the field
of linguistics, (2) Presenting a detailed illustration of person deixis, and (3) Conducting an
analysis of person deixis in one of Synge‟s plays Riders to The Sea according to Levinson‟s
model. The most important aim of these three is the third one (the analysis). To achieve this
aim, the researcher depends on Levinson‟s (1983) descriptive approach. According to the
descriptive approach of deixis, the category of person deixis can be defined as the encoding of
the participant roles in the speech situation. This encoding is r
In The Name of Allah Most Gracious Most Merciful
This is a study dedicated to explaining the conditions of the end of heaven, stage by stage; And to draw the final picture of it, through the facts of the Qur’an, and to make the contextual integration of the verses of the end of heaven, and their arrangement in an intentional arrangement, a path that guides us to knowing the integrated picture of it on the Day of Resurrection, according to scientific interpretation.
The importance and usefulness of the research lies in:
Extracting the order of the stages of the end of heaven, from its first state to its last, which came in separate verses of the Qur’an, each one of which was placed in a surah that was consistent w
... Show MoreReceipt date:10/27/2021 accepted date:12/15/2021 Publication date:31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The phenomenon of extremist extremism (terrorism) was one of the most prominent issues that took a large space in the twenty-first century, in which cognitive motives were mixed with strategic and ideological motives, leading to the emergence of terrorist extremi
... Show MoreThe present study investigates the use of intensifiers as linguisticdevices employed by Charles Dickens in Hard Times. For ease of analysis, the data are obtained by a rigorous observation of spontaneously occurring intensifiers in the text. The study aims at exploring the pragmatic functions and aesthetic impact of using intensifiers in Hard Times.The current study is mainly descriptive analytical and is based on analyzing and interpreting the use of intensifiers in terms ofHolmes (1984) andCacchiani’smodel (2009). From the findings, the novelist overuses intensifiers to the extent that 280 intensifiers are used in the text. These intensifiers(218) are undistinguished
... Show MoreThe present work utilizes polyacrylic acid beads (PAA) to remove Alizarin yellow R (AYR)] and Alizarin Red S (ARS) from its solution. The isotherms of adsorption were investigated and the factors that impact them, such as temperature, ionic strength effect, shaking effect, and wet PAA. The isotherms of adsorption of (ARS) were found obeys the Freundlich equation. The isotherms of adsorption of (AYR) were found obeys the Langmuir equation. At various temperatures, the adsorption process on (PAA) was investigated. According to our data, there is a positive correlation between the (ARS and AYR) adsorption on the PAA and temperature (Endothermic process). The computation of the thermodynamic functions (ΔH, ΔG, and ΔS) is based on the foregoi
... Show MoreTreatment of a high strength acidic industrial wastewater was attempted by activated carbon
adsorption to evaluate the feasibility of yielding effluents of reusable qualities. The experimental
methods which were employed in this investigation included batch and column studies. The
former was used to evaluate the rate and equilibrium of carbon adsorption, while the latter was
used to determine treatment efficiencies and performance characteristics. Fixed bed and expanded
bed adsorbers were constructed in the column studies. In this study, the adsorption behavior of acetic acid onto activated carbon was examined as a function of the concentration of the adsorbate, contact time and adsorbent dosage. The adsorption data was mo
A compact microstrip six-port reflectometer (SPR) with extended bandwidth is proposed in this paper. The design is based on using 16-dB multi-section coupled line directional couplers and a multi-section 3-dB Wilkinson power divider operating from 1 to 6 GHz. The proposed SPR employs only two calibration standards: a matched load and an open load. As compared to other dielectric substrates, fabricating the proposed SPR involves using a low-cost (FR4) substrate. A novel algorithm is also proposed to estimate the complex reflection coefficient over the frequency ranges at which the standard performance of the circuit components is not fully satisfied. The new algorithm is based on the circles’ intersection points, which have been de
... Show More