Preferred Language
Articles
/
ijs-7225
Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG

One of the primary problems in internet is security, mostly when computer utilization is increasing in all social and business areas. So, the secret communications through public and private channels are the major goal of researchers. Information hiding is one of methods to obtain a security communication medium and protecting the data during transmission.
This research offers in a new method using two levels to hide, the first level is hiding by embedding and addition but the second level is hiding by injection. The first level embeds a secret message in one bit in the LSB in the FFT and the addition of one kashida. Subtraction of two random images (STRI) is RNG to find positions for hiding within the text. The second level is the injection of one or two random kashida within the text. Linguistic steganography covers all the techniques that deal with using written natural language to hide secret message. This research presents a linguistic steganography for scripts written in Arabic language, using kashida and Fast Fourier Transform on the basis of a new technique entitled subtraction of two random Images (STRI) as location to hide a secret message. The proposed approach is an attempt to present a transform linguistic steganography using levels for hiding to improve implementation of kashida, and improve the security of the secret message by using subtraction two random Images (STRI). This method was tested in terms of security and capacity, transparency, and robustness and this is way better than previous methods. The proposed algorithms ideal for steganographic properties.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Research Journal Of Pharmacy And Technology
Electro-polymerization of poly eugenol on ti and ti alloy dental implant treatment by micro arc oxidation using as anti-corrosion and anti-microbial

In this work, electrochemical process was presented to polymerized eugenol on Gr.2 and Gr.5 titanium alloys before and after treated by Micro Arc Oxidation (MAO), where Gr.2 is commercial pure titanium and Gr.5 is Ti-6Al-4V dental alloys. The deposited layers were characterized by scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The adhesion strength of polymeric thin-film was estimation by using pull-off adhesion test and the result was the adhesion strength of PE was (1.23 MPa) on Gr.2 before MAO and increase to (1.98 MPa) on Gr.2 after MAO treatment. The corrosion behavior of Gr.2 and Gr.5 alloy in artificial saliva environment at

... Show More
Scopus (23)
Crossref (10)
Scopus Crossref
View Publication
Publication Date
Thu Mar 01 2018
Journal Name
Arab World English Journal
Publication Date
Thu Mar 15 2018
Journal Name
Arab World English Journal
Crossref (1)
Crossref
View Publication
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
representations of body language in the contemporary Iraqi theatrical show "Imagine That as a model": عمار عبد سلمان محمد

There is no doubt that each of the arts has a material from which the aesthetic achievement is built, so the researcher found that the art of theater, especially the show, whose artistic achievement is based on the body of the actor who emits the formal language (body language), is the focus of interest and active presence, because the body possesses its spiritual qualities that made him and the ability to The formation of things by (his body language), so the researcher studied this theatrical phenomenon and divided it into four chapters. In the first chapter, the research problem included the following question: (Is there a phenomenon of body language in the contemporary theatrical show "Imagine that" as a model) so It is of cognitive

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Real-Time Cloth Simulation on Virtual Human Character Using Enhanced Position Based Dynamic Framework Technique

     Cloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications.   This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit

... Show More
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Mon Aug 16 2021
Journal Name
TÜrkÇe SÖzlÜkte Tdk Yer Alan ArapÇa Kelİmeler Üzerİne Bİr Anlam Bİlİmİ İncelemesİ
Publication Date
Mon Feb 01 2010
Journal Name
Alustath Journal
Persuasive Language in Blurbs

Advertisement is a general phenomenon in our everyday life. In most cases, it is established for commercial purposes i.e. it is oriented for certain goals and waiting for results. One form of advertisement is a blurb. In this study, the researcher applies Fonton and Saint-Dizier (2010) and Hymes (1962) models on 23 blurbs. These two models are chosen on consideration of accounting grammatical categories and speech events respectively. The study tends to answer the following question: How do blurb’s writers exploit language to convince the reader to buy the intended book? Therefore, the aim of the study can be stated as analyzing the blurbs according to these two models and finding which category scores higher and serves in ad

... Show More
Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Excellence in Language Education

The primary goal of the study is to practise some systematic strategies for foreign language instruction despite the fact that no single approach to language classroom instruction is inherently superior to others; instead the choice of an approach should be determined by the teacher, students, the subject matter, and the situation. The paper adopts certain strategies which may assist EFL teachers to excel in their work and continue their professional development. Hence, it is intended for language teachers who understand the value of good teaching and like to produce academically successful students. The study could also help college student teachers to acquire new strategies in order not only to succeed but also to excel in their learni

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Review Study of E-Voting System Based on Smart Contracts Using Blockchain Technology

Voting is an important procedure in democratic societies in different countries, including Iraq. Electronic voting (E-voting) is becoming more prevalent due to reducing administrative costs and burdens. E-voting systems have many restrictions that affect the electoral process. For example, fraud, tampering with ballot boxes, taking many hours to announce results, and the difficulty of reaching polling stations. Over the last decade, blockchain and smart contract technologies have gained widespread adoption in various sectors, such as cryptocurrencies, finance, banking, and most notably in e-voting systems. If utilized properly, the developer demonstrates properties that are promising for their properties, such as security, privacy, trans

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF