Surveying 59 references concerning the occurrence of the monogeneans of the family Diplozoidae parasitizing fishes of Iraq showed the occurrence of 15 valid species of this family which included one species of Diplozoon, one species of Eudiplozoon and 13 species of Paradiplozoon. In addition to these species, some unidentified adult and larval (diporpa larvae) specimens of the genus Diplozoon were reported from 12 fish hosts among which four fish species showed no infection with any of the nominated diplozoid species while the others showed mixed diplozoid infections. These diplozoids were reported from 27 fish host species in Iraq. All the diplozoids were recorded from freshwater habitats except one <
... Show MoreAbstract: Two different shapes of offset optical fiber was studied based on coreless fiber for refractive index (RI)/concentration (con.) measurement, and compare them. These shapes are U and S-shapes, both shapes structures were formed by one segment of coreless fiber (CF) was joined between two single mode (SMF) lead in /lead out with the same displacement (12.268µm) at both sides, the results shows the high sensitive was achieved in a novel S-shape equal 98.768nm/RIU, to our knowledge, no one has ever mentioned or experienced it, it’s the best shape rather than the U-shape which equal 85.628nm/RIU. In this research, it was proved that the offset form has a significant effect on the sensitivity of the sensor. Addi
... Show MoreIn a world of fierce competition companies of different activities strive to strengthen their competitiveness in order to be able to deliver greater value to their customers and gain a distinct sites in competition with other companies in the market at the local and international levels. Every company seeks to focus on one or more of the competitive capabilities in order to turn it into an obvious advantage or a number of competitive advantages to contribute in improving the performance and superiority over its competitors. Therefore, the management of companies no longer need only useful information for the internal aspects of the environment, but also need to include the external environment that includes various and constantly changin
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023