In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English character needs 8 bits in a conventional method, using RNA with secret table has provided a good degree of security, moreover using non-printed characters, these characters do not appear on screen so have provided a complete similarity between the Arabic cover text and stegotext.
Marriage is a holly secret in Christian religion .So it id natural that its ceremonies acquired religious form .In general the marriage is contracted by minister of religion in presence of the two parties or by a proxy or presence of parents if it is necessary . And to make the condition of publicity for the marriage ,its procedures must be made before witnesses .Also the minister of religionhave to confirm the agreement of the two parties before beginning the procedures.The marriage ceremonies are made.These procedures are religious traditions that includes praying and make blessings and putting the rings in fingers by thepriest . The marriage is a holly secret performed by the crown pray according to the church religious traditions
Tax compliance is one of the most important programs that countries seek to combat a tax evasion. the congress of u.s. enactrd an act which guarantes the us: government fighting against tax evasion of those citizens who lives outside its territory. this act is called: (the foreign account tax compiliance act), FATCA 2013. the idea of this law is embodied in commitment of all non – us foreign financial institutions and bank sin in countries that have memorand am of mutel cooperation with the U.S government to diselose their records for internal revenue service and to report in formation about accounts by u.s. account holders so that (IRS) can with hold on pay ments to certiav investors according to the u.s. legal rules .
... Show More
Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreThe aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we
... Show MoreA Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated vi
... Show MoreActive learning is a teaching method that involves students actively participating in activities, exercises, and projects within a rich and diverse educational environment. The teacher plays a role in encouraging students to take responsibility for their own education under their scientific and pedagogical supervision and motivates them to achieve ambitious educational goals that focus on developing an integrated personality for today’s students and tomorrow’s leaders. It is important to understand the impact of two proposed strategies based on active learning on the academic performance of first-class intermediate students in computer subjects and their social intelligence. The research sample was intentionally selected, consis
... Show MoreThe hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre
... Show MoreWestern Scholars have criticized al the material on the point of reliability . Some have taken the unduly Sceptical view that nothing is to be trusted except Quran . The present study is based on opposing view that at least the material in the early biographers is to be accepted as true , except where there are particular reasons for thinking that an anecdote has been distorted ( or invented ) through legal or political motives. It is also assumed that most of the background material culled from a large number of vaired works , is sound . This standpoint .I would claim , leads to a coherent view of Muhammad's life and achievement.
The research deals with the concept of stigma as one of the important phenomena that cast a shadow over the nature of the individual, his being and his personality through the inferior view with which he confronts in society, and (Sartors) indicates in this regard that stigma may lead to negative discrimination that leads to many defects, in terms of obtaining On care, poor health, service, and frequent setbacks that can damage self-esteem. The first roots of this phenomenon go back to the Greek civilization and what the Greeks used to burn and cut off some parts of the body and then announce to the nation that the bearer of this sign is a criminal. In addition to the Arab peoples living from setbacks that contributed to the exacerbation
... Show MoreRecently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a
... Show More