Preferred Language
Articles
/
jih-1444
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
The 4th International Virtual Conference In Educational And Human Sciences, Arts, And Languages
Measuring Situational Language Teaching to English Student's Speaking in Private Schools
...Show More Authors

English teachers in Iraq and other countries around the world up to this time use traditional methods to help students memorize new vocabularies. The sense of words or structure is not to be given in either the native tongue or the target language by definition, but is induced by the way the form is used in the situation. Situational Language Teaching (SLT) has recently become the needed method for improving speaking skills. It indicates the application of learning the language in actual and social exchange expressions so as to let learners do as required in classroom and non-classroom circumstances. This pilot study seeks to answer the following questions: Can SLT improve English speaking skills of target learners? How SLT contribute to th

... Show More
View Publication
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (57)
Crossref (57)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Experimental and numerical investigation on the behavior of reinforced reactive powder concrete two-way slabs under static load
...Show More Authors

This paper studied the behaviour of reinforced reactive powder concrete (RPC) two-way slabs under static load. The experimental program included testing three simply supported slabs of 1000 mm length, 1000 mm width, and 70 mm thickness. Tested specimens were of identical properties except their steel fibers volume ratio (0.5 %, 1 %, and 1.5 %). Static test results revealed that, increasing steel fibers volume ratio from 0.5% to 1% and from 1% to 1.5%, led to an increase in: first crack load by (32.2 % and 52.3 %), ultimate load by (36.1 % and 17.0 %), ultimate deflection by (33.6 % and 3.4 %), absorbed energy by (128 % and 20.2 %), and the ultimate strain by (1.1 % and 6.73 %). The stiffness and ductility of the specimens also increased. A

... Show More
View Publication
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant b

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of The College Of Education For Women
Arabic prose poem and the antithesis of contrast: poetry _ prose and West _ East
...Show More Authors

Arabic prose poem and the antithesis of contrast: poetry _ prose and West _ East

View Publication Preview PDF
Publication Date
Tue Apr 05 2022
Journal Name
International Journal Of Criminology And Sociology
The Arabic Root and the Peculiarities of Its Language Categorization (Structure and Inflection)
...Show More Authors

This article discusses the peculiarities of the Arabic root, its phonemic structure, and morphological categorization. The pure appearance of the Arabic root in language categorization allows you to separate the onomatopoeic feature of inflectional structure and phonetic rules of the Arabic language by which the root is categorized. This phenomenon of meaningful consonant phonemes in the Arabic roots makes the theory of onomatopoeia practicable not just only in Arabic but also in other Semitic languages. Moreover, the first consonant of an Arabic root usually contains the word's primary, essential meaning, and the second and third lookup. Also, in this work, it is noted that the grammar of the Arabic language has many features aimed

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 16 2018
Journal Name
Al-mustansiriya Journal Of Arts
Difficulties Faced by Iraqi EFL Learners in Translating English Barnyard Verbs
...Show More Authors

Translation is a vital process that needs much more understanding and mutual background knowledge on the part of ESL or EFL learners in terms of grammar , meaning and context of both the SL and TL . Thus , the main aim of the current research paper is to identify and figure out the techniques used by ESL or EFL learners when translating English barnyard verbs into Arabic . The main problem of this study is attributed to the fact that ESL or EFL learners may not be able to identify and understand the connotative meaning of barnyard verbs since these verbs are onomatopoeic (i.e,) a word that phonetically imitates, or suggests the source of sound that it describes. Therefore they may be unable to translate these verbs appropriately and accura

... Show More
Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
2009 Ieee Symposium On Industrial Electronics & Applications
ITTW: T-way minimization strategy based on intersection of tuples
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Engineering Journa
Flexural Moment Capacity Evaluation of Reinforced RPC Two-way Slabs
...Show More Authors

The aim of this paper is to determine the flexural moment capacity of Reactive Powder Concrete (RPC) two-way slabs based on three models proposed by previous studies (Model 1, Model 2, and Model 3). The results obtained from these models were compared with those obtained from experimental work to check the accuracy and the applicability of the adopted theoretical models. The experimental program included the testing of three simply supported RPC two-way slabs (1000x1000x70) mm each. The tested specimens had identical properties except their steel fibres volume ratios (0.5 %, 1 %, and 1.5 %). The comparison with the experimental data showed that (Model 3) is the most suitable one among the three models. Model 1 was found to underestimate the

... Show More
Crossref (1)
Crossref