Today we are witnessing huge scientific and technical progress so we need more skills and methods of thinking that needs to be acquired by the teacher, as the importance of computers in education there are many teachers suffering of the difficulty in teaching for pupils . researchers tried to find a good suitable way with the technological interests for now which represent by computer design software and the introduction of enrichment activities in the curriculum because it is one of a contemporary trends for the development of the Arabic language with various levels of education and knowing if this program has negative or positive impact.
So 
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreAlizarin is one of the popularly used and wide separated compounds with a chemical name (1,2- dihydroxy-9,10-anthraquinone) which belong to the anthraquinones family that contain three aromatic conjugated rings and in the central rings it contains two ketonic groups.1
This work provides a historical overview of water storage tanks used for solar energy collection, with a focus on the impact of different geometric configurations on thermal performance and energy storage efficiency. The designs of cylindrical, spherical, rectangular and triangular tanks were reviewed to analyse their effects on thermal gradients, heat retention and energy storage capacity. Within the scope of nominal processes, the study primarily aimed to identify the factors influencing the choice of tank shape in terms of size, capacity and aspect ratio. Another key objective was to assess what enhances heat storage in the tank to improve thermal efficiency. Comparing cylindrical shapes to other shapes, such as spherical, rectan
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe clinical response to natalizumab in patients with multiple sclerosis (MS) may be significantly influenced by genetic variation. Mutations in genes related to the drug’s mechanism of action or the pathological milieu of MS can contribute substantially to interindividual differences in treatment outcomes. This review aims to provide an overview of previous studies that have examined genetic polymorphisms associated with the clinical efficacy of natalizumab. A systematic literature search was conducted across the PubMed, Google Scholar, and ResearchGate databases using targeted keywords relevant to the subject matter. Several genetic loci were found to be linked to natalizumab responsiveness, including the integrin subunit alpha 4 (ITGA4
... Show More