Preferred Language
Articles
/
ijs-6486
Text Steganography Method Based On Modified Run Length Encoding
...Show More Authors

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on some of the similarity measures of Steganography.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Mouth Rinses on Surface Roughness of Two Methacrylate-Based and Siloraine-Based Composite Resins
...Show More Authors

Background: Various fluids in the oral environment can affect the surface roughness of resin composites. This in vitro study was conducted to determine the influence of the mouth rinses on surface roughness of two methacrylate-based resin (nanofilled and packable composite) and siloraine-based resin composites.

Materials and methods: Disc-shaped specimens (12 mm in diameter and 2mm in height) were prepared from three types of composi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 31 2018
Journal Name
Journal Of Engineering
Effecting of pH Parameter on Simulated Wastewater Treatment Using Electrocoagulation Method
...Show More Authors

The aim of the present research is to investigate the effecting of pH parameter on the feasibility of lead removal from simulated wastewater using an electrochemical system. Electrocoagulation method is one of electrochemical technology which is used widely to treat industrial wastewater. Parameters affecting this operation, such as initial metal concentration, applied current, stirrer speed, and contact time of electroprocessing were taken as 155ppm, 1.5 Ampere, 150 rpm, 60 minutes respectively. While pH of the simulated wastewater was in the range of  2 to 12 in the experiments. It was found from the results that pH is an important parameter affecting lead removal operation. The best value of pH parameter is appro

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (15)
Scopus Crossref
Publication Date
Wed Mar 04 2020
Journal Name
Frontiers In Plant Science
Suppression of Arabidopsis Mediator Subunit-Encoding MED18 Confers Broad Resistance Against DNA and RNA Viruses While MED25 Is Required for Virus Defense
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun May 10 2020
Journal Name
Baghdad Science Journal
Prevalence of Quinolones Resistance Proteins Encoding Genes (qnr genes) and Co-Resistance with β-lactams among Klebsiella pneumoniae Isolates from Iraqi Patients
...Show More Authors

This study investigated the prevalence of quinolones resistance proteins encoding genes (qnr genes) and co-resistance for fluoroquinolones and β-lactams among clinical isolates of Klebsiella pneumoniae.  Out of 150 clinical samples, 50 isolates of K. pneumoniae were identified according to morphological and biochemical properties. These isolates were collected from different clinical samples, including 15 (30%) urine, 12 (24%) blood, 9 (18%) sputum, 9 (18%) wound, and 5 (10%) burn. The minimum inhibitory concentrations (MICs) assay revealed that 15 (30%) of isolates were resistant to ciprofloxacin (≥4µg/ml), 11 (22%) of isolates were resistant to levofloxacin (≥8 µg/ml), 21 (42%) of isolates were re

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Wrapper and Hybrid Feature Selection Methods Using Metaheuristic Algorithms for English Text Classification: A Systematic Review
...Show More Authors

Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Wed Dec 25 2024
Journal Name
Journal Of Baghdad College Of Dentistry
The relation among ramal width and length with some cervical and cranio-facial measurements in different skeletal classes
...Show More Authors

Background: The purpose of this study was to assess the relation among the ramal length and width with various cervical and cranio-facial measurements for a sample of Iraqi adults with different skeletal classes. Materials and method: The sample composed of 71 Iraqi adults (36 females and 35 males) with an age ranged between 17-30 years and had different skeletal mal-relations using SNA, SNB and ANB to differentiate between them and assorting them into CL.I, CL.II and CL.III mal-relation. Each individual was subjected to clinical examination and digital true lateral cephalometric radiograph that had been analyzed using AutoCAD 2007 software computer program to determine sixteen linear and ten angular measurements. Descriptive statistics wer

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Simulations of the initiation and propagation of streamers in electrical discharges inside water at 3 mm length gap
...Show More Authors

This work is devoted to the modeling of streamer discharge, propagation in liquid dielectrics (water) gap using the bubble theory. This of the electrical discharge (streamer) propagating within a dielectric liquid subjected to a divergent electric field, using finite element method (in two dimensions). Solution of Laplace's equation governs the voltage and electric field distributions within the configuration, the electrode configuration a point (pin) - plane configuration, the plasma channels were followed, step to step. The results show that, the electrical discharge (streamer) indicates the breakdown voltage required for a 3mm atmospheric pressure dielectric liquid gap as 13 kV. Also, the electric potential and field distributions sho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 05 2010
Journal Name
Journal Of College Of Education For Women
Conversation Analysis of Forum: a Selected Text from Paul S. Kemp Online Journal
...Show More Authors

Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit

... Show More
Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.        Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o

... Show More
Preview PDF
Crossref (2)
Crossref