Preferred Language
Articles
/
ijs-6486
Text Steganography Method Based On Modified Run Length Encoding
...Show More Authors

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on some of the similarity measures of Steganography.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 24 2022
Journal Name
Wasit Journal Of Pure Sciences
Synthesis of the integer FIR filters with short coefficient word length
...Show More Authors

The integer simulation and development finite impulse response (FIR) filters taking into account the possibilities of their realization on digital integer platforms are considered. The problem statement and solution of multifunctional synthesis of digital FIR filters such a problem on the basis of the numerical methods of integer nonlinear mathematical programming are given. As an several examples, the problem solution of synthesis FIR-filters with short coefficient word length  has been given. The analysis of their characteristics is resulted. The paper discusses issues of modeling and synthesis of digital FIR filters with provision for the possibilities of their implementation on digital platforms with integer computation arithme

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network
...Show More Authors

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Study Effect of Lighting of Non – Regular on Statistical Properties for the Written Text on Whiteboard
...Show More Authors

 Lighting is a very important element of treatment if the color contains many imaging system (digital cameras) and the unit of light and the light within these units are not strong , but usefel when the light is low , in different lighting intensities conditions image quality will not persist good enough and image may become dark or slightly exposed to light which leads to lower the details in image where we can not modify contrast or light ness to compensate thr decrease without losing the light and dark deatials . So we went in this research to study the variation colored texts written on the painting and lighting cases of non –regular ( a few) and different distances . As the diversity of these texts written on the board a

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Effect of Allowable Vertical Load and Length/Diameter Ratio (L/D) on Behavior of Pile Group Subjected to Torsion
...Show More Authors

Some structures such as tall buildings, offshore platforms, and bridge bents are subjected to lateral loads of considerable magnitude due to wind and wave actions, ship impacts, or high-speed vehicles. Significant torsional forces can be transferred to the foundation piles by virtue of eccentric lateral loading. The testing program of this study includes one group consists of 3 piles, four percentages of allowable vertical load were used (0%, 25%, 50%, and 100%) with two L/D ratios 20 and 30, vertical allowable load 110 N for L/D = 20 and 156 N for L/D = 30. The results obtained indicate that the torsional capacity for pile group increases with increasing the percentage of allowable vertical load, when the percentage of allowable vertica

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sun Dec 22 2024
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of nutritional status on arch width and length of primary teeth among five years old kindergarten children
...Show More Authors

Background: In human life, malnutrition may adversely affect various aspects of growth at different stages of life. Teeth are particularly sensitive to malnutrition. Malnutrition may affect odontometeric measurement involving arch width and length of primary dentition. The aim of this study is to estimate the effect of nutrition on arch width and length dimension measurements among children aged 5 years old. Material and methods: This study was conducted among malnourished group in comparison to well-nourished group matching with age and gender. The present study included 158 children aged 5 years (78 malnourished and 80 well-nourished). The assessment of nutritional status was done by using three nutritional indicators, namely Height-for-a

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Journal Of Electronic Materials
Influence of Dry and Wet Etching on AlInSb Contact Resistivity, Transfer Length, and Sheet Resistance Using Circular Transmission Model
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Fast Text Analysis Using Symbol Enumeration and Hashing Methodology
...Show More Authors

This paper is focusing on reducing the time for text processing operations by taking the advantage of enumerating each string using the multi hashing methodology. Text analysis is an important subject for any system that deals with strings (sequences of characters from an alphabet) and text processing (e.g., word-processor, text editor and other text manipulation systems). Many problems have been arisen when dealing with string operations which consist of an unfixed number of characters (e.g., the execution time); this due to the overhead embedded-operations (like, symbols matching and conversion operations). The execution time largely depends on the string characteristics; especially its length (i.e., the number of characters consisting

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Analysis of Traditional and Fuzzy Quality Control Charts to Improve Short-Run Production in the Manufacturing Industry
...Show More Authors

Quality control charts are limited to controlling one characteristic of a production process, and it needs a large amount of data to determine control limits to control the process. Another limitation of the traditional control chart is that it doesn’t deal with the vague data environment. The fuzzy control charts work with the uncertainty that exists in the data. Also, the fuzzy control charts investigate the random variations found between the samples. In modern industries, productivity is often of different designs and a small volume that depends on the market need for demand (short-run production) implemented in the same type of machines to the production units. In such cases, it is difficult to determine the contr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Secret-Text by e-Abacus Diagram II
...Show More Authors

In this work, there will be upgraded on the work of (Mahmood and Mahmood , 2018) by finding a general rule of the code for any text made from any number of words by using James e-Abacus Diagram in partition theory

View Publication Preview PDF
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Place Sexuality in the Arabic Text Theatre
...Show More Authors

     It is doubtless that the sexual place has some common indicators due to the masculine and feminine bodies which may be natural or deviated (homosexual). The female has an act of voice in the imaginary masculine place whereas the male has an act of image recognized in the parental mind in both the secular and sacred place. Those places create different limits and perceptions according to the auditory and visual readings in search of identity, text and body in the feminine dramatic text.

    The research includes four chapters; the first, the methodological framework, involves the problem which is centralized in the following enquiry: What is the relationship between the place and the term of

... Show More
View Publication Preview PDF
Crossref