In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution
Bubbled slabs can be exposed to damage or deterioration during its life. Therefore, the solution for strengthening must be provided. For the simulation of this case, the analysis of finite elements was carried out using ABAQUS 2017 software on six simply supported specimens, during which five are voided with 88 bubbles, and the other is solid. The slab specimens with symmetric boundary conditions were of dimensions 3200/570/150 mm. The solid slab and one bubbled slab are deemed references. Each of the other slabs was exposed to; (1) service charge, then unloaded (2) external prestressing and (3) loading to collapse under two line load. The external strengthening was applied using prestressed wire with four approaches, wh
... Show MoreThe ascorbic acid content of juices of some fruits and pharmaceutical tablets of Vitamin C was determined by a homemade apparatus of DIE technique using a thermocouple as heat sensor. The method is simple, speed, low cost and the different types of turbid, colored samples can be analyzed without any problem. The results were of a valuable accuracy and precision, and the recovery of results was with acceptable values
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe present article is devoted to the analysis of Arabic phraseological units with a component hand, selected by continuous sampling from the “Training Russian-Arabic phraseological dictionary: about 900 phraseological units” by G. L. Permyakov. Arabic phraseological units with a component hand are modeled as invariant situations (by logical-semiotic models) and figurative statements are expressed by phraseological variants (according to the figurative characteristic of the hand component). The artical focuses on the fact that somatism in Arabic phraseology has a symbolic and symbolic nature, marking various situations of Arabs' behavior, their actions, deeds, rituals, emotional and psychological states, etiquette, in
... Show MoreMany purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa
... Show MoreAbstract in English The aim of this study is to identify the effectiveness of rehabilitation exercises in conjunction with aquatic therapy for those suffering from sacroiliitis in football players. The researcher used the experimental approach, using the experimental design (pre-measurement, post-measurement). Similar to the objectives and procedures of the research, the researcher assumed the following: the existence of significant differences. Statistics between pre- and post-measurements in variables in favor of post-measurement for the following variables (degree of pain and level of balance). The experimental approach was used with a pre- and post-measurement design on one group of football players with sacroiliitis, nu
... Show MoreToday’s academics have a major hurdle in solving combinatorial problems in the actual world. It is nevertheless possible to use optimization techniques to find, design, and solve a genuine optimal solution to a particular problem, despite the limitations of the applied approach. A surge in interest in population-based optimization methodologies has spawned a plethora of new and improved approaches to a wide range of engineering problems. Optimizing test suites is a combinatorial testing challenge that has been demonstrated to be an extremely difficult combinatorial optimization limitation of the research. The authors have proposed an almost infallible method for selecting combinatorial test cases. It uses a hybrid whale–gray wol
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show More