Preferred Language
Articles
/
ijs-6144
Proposed Hiding Text in Text Based On RNA for Encoding Secret Information
...Show More Authors

In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English character needs 8 bits in a conventional method, using RNA with secret table has provided a good degree of security, moreover using non-printed characters, these characters do not appear on screen so have provided a complete similarity between the Arabic cover text and stegotext.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Integration Between The Target Costing and Resource Consumption Accounting Techniques in Reducing Costs and Supporting Competitive Advantage - Analytical Study of The Opinions of a Sample of Employees of The Babylon Cement Factory.
...Show More Authors

Abstract

The purpose of this research is to develop a proposed framework for achieving the Integration of the Target Cost and Resource Consumption Accounting Techniques and to show the role they play in reducing products costs and supporting the competitive advantage to cope with contemporary changes. To achieve this goal, the researchers followed the analytical method using the statistical questionnaire as a means of collecting data from the research sample include accounting, administrative, technical, engineering staffs and others. The research sample consists of (56) individuals and for the purpose of conducting statistical analysis of the data and testing hypotheses, the statistical program (SPSS) wa

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
Determination of hydrogen peroxide in some local pharmaceutical disinfectants by continuous flow injection analysis via turbidimetric (T180o) and scattered light effect at two opposite positions (2N90o ) using Ayah 4SW-3D-T180o -2N90o -Solar - CFI Analyse
...Show More Authors

An indirectly method is used to determine hydrogen peroxide. The method based on oxidation of chromium (III) ion by hydrogen peroxide in basic medium to form chromate ion which react with barium (II) ion to produce a yellow precipitate (BaCrO4). Under the optimum established conditions, the linear range of 0.50-25.00 mmol L-1 along with correlation coefficient (r) of 0.9992, Limit of detection (LOD) 0.68 μg / 100 μL, precision expressed as relative standard deviation for six replication measurements at 5.0 mmol.L-1 H2O2 of less than 2% were obtained for hydrogen peroxide. The developed method was successfully applied for the estimation of H2O2 in three pharmaceuticals preparation of different companies using continuous flow injection o

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Linguistic Characteristics In The Morphology ( Nominal Suffixes ) Of a Number Of ( Khoryat or Hoyrat ) Printed By The Poet Kamal Mustafa Daquqli: Kemal Mustafa Dakuk ̕ lunun Basılmayan Bazı Hoyratlarında Şekil Bilgisi Özelliklerin ( İsim Durum Ekleri )
...Show More Authors

The present study, entitled “ linguistic characteristics (the morphology - nominal suffixes ) of a number of (Quriyat or koyrat ) by the poet Kamal Mustafa Daquqli, aims at studying and making a comparison between  Turkmen dialect written and spoken forms that show many of the hidden language structures. Similarly, the study sheds light on the poet as one of the most prominent literary figures in Turkmenistan literature.

Turkman Quriyat is one of Turkman blank verse significant forms. Apart from (songs and Quriyat) and until the 19th C., folk poetry has been stalled for a long time but reclaimed its literary high position in the middle of the 20th C.

The study introduction briefly discusses Tu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
The neology in the Iraqi dialect after the invasion of 2003 and the level of imaginative comprehension: La neología en el dialecto Iraqui tras la invasión de 2003 y el nivel de la comprensión imaginativa
...Show More Authors

       The article analyzes the neologisms that arose in the Iraqi dialect after the 2003 US-British invasion and the fall of Saddam Hussein's regime, according to the theory I advocate: "The Basic Outline of Reference," a developed theory of Arab legacy and cognitive theory, which came out in 1987 in America, so we have used the terminology of cognitive grammar. In this theory it is stated that the reference is the interaction between four components: perception, imagination, imaginative comprehension and the linguistic sign or symbolization (the neological word in this article), which are closely related, so that none of them can be lacking, because they constitute a holistic whole that belongs to a deeper level. Let us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Performance Evaluation and Comparison Between LDPC and Turbo Coded MC-CDMA
...Show More Authors

This work presents a comparison between the Convolutional Encoding CE, Parallel Turbo code and Low density Parity Check (LDPC) coding schemes with a MultiUser Single Output MUSO Multi-Carrier Code Division Multiple Access (MC-CDMA) system over multipath fading channels. The decoding technique used in the simulation was iterative decoding since it gives maximum efficiency at higher iterations. Modulation schemes used is Quadrature Amplitude Modulation QAM. An 8 pilot carrier were
used to compensate channel effect with Least Square Estimation method. The channel model used is Long Term Evolution (LTE) channel with Technical Specification TS 25.101v2.10 and 5 MHz bandwidth bandwidth including the channels of indoor to outdoor/ pedestrian

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Communications In Computer And Information Science
The Use of Biorthogonal Wavelet, 2D Polynomial and Quadtree to Compress Color Images
...Show More Authors

In this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Degree to which Arabic Language Teachers at the Secondary Stage Possess the Teaching Competencies Necessary to Develop the Literary Appreciation Skills of Their Students from the Point of View of Educational Leaders in Bisha Governorate
...Show More Authors

This study aims to identify the degree of Arabic language teachers at the secondary stage possessing the teaching competencies necessary to develop the skills of literary savor among their students from the perception of educational leaders in Bisha Province. To achieve the objectives of the study, the descriptive approach was used by adopting a comprehensive survey method. The study sample consisted of (48) school principals and Arabic language supervisors in Bisha Province who supervise the teaching of Arabic language at the secondary level in Bisha Province. The necessary data was collected using a questionnaire. The results of the study revealed that the evaluation of the study sample for the degree to which Arabic language teachers

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Molecular Cloning of large DNA Fragments of The Sal t Tolerant wild Tetra ploid bermudagrass Cynodon Dactylon L. Using A Bacteriophage Cloning Vector 2. Ligation a nd in vitro packaging of The Recombinant Phage DNA Molecules
...Show More Authors

This  paper represent  the second  step  i n  a molecular clon i ng program ai ming to clone large DNA  fi·agmen ts of the sal t tolerant  bermudagrass (Cyrwdon  dactylon  L.)  DNA  usi ng  the  bacteriophage  (EM13L3) as    a vector.

In th is  work, a yield of about  I 00  g bacteriophage  DNA  per one  liter culture.was obtained  with.a  purity ranging between (1.7-1.8). The vector JJNA  v.as  completely   double   digested   with  the  restriction   enzymes llamHI   and  EcoRI,  followed  by  pu

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
Principles of modeling a dictionary article in the «Dictionary of the Russian Folklore: lexicon epics» (M.A. Bobunova, A.T. Khro: Принципы моделирования словарной статьи В «словаре языка русского фольклора: Лексика былины» (М. А. Бобунова, А. Т. Хроленко)
...Show More Authors

The article describes the basic principles of modeling a dictionary article in the “Dictionary of the Language of Russian Folklore Lexicon epics” (M. A. Bobunova, A. T. Khrolenko). Among such principles are the principle of linguocentrism (representation of universal cognitions in strict observance of the traditions of lexicographic science), the principle of anthropocentrism (language learning as a means of human consciousness / subconsciousness), the principle of expansionism (attracting material from various knowledge bases), the principle of explanatory ("explanatory moment"), and fractal principle (synergistic potential of the presented material: nonlinearity and self-similarity; hierarchical organizati

... Show More
View Publication Preview PDF
Crossref