Preferred Language
Articles
/
ijs-6486
Text Steganography Method Based On Modified Run Length Encoding
...Show More Authors

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on some of the similarity measures of Steganography.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis of the requirements of electronic management and its role improving The performance of human resources: Applied research at Iraqi general insurance company
...Show More Authors

The study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.

 The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
Some innovative word-formation processes in popular Internet texts in Russian and Arabic: Некоторые Инновационные словообразовательные процессы в популярных интернет-текстах в русском и арабском языках
...Show More Authors

       The present article discusses innovative word-formation processes in Internet texts, the emergence of new derivative words, new affixes, word-formation models, and word-formation methods. Using several neologisms as an example, the article shows both the possibilities of Internet word-making process and the possibilities of studying a newly established work through Internet communication. The words selected for analysis can be attributed to the keywords of the current time. (In particular, the words included in the list of "Words of 2019") there are number of words formed by the suffix method, which is the traditional method of the Russian word formation. A negation of these words is usually made thro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
OUTDATED VOCABULARY in A. I. HERZEN's NOVEL " who is to BLAME?": УСТАРЕВШАЯ ЛЕКСИКА В РОМАНЕ А. И. ГЕРЦЕНА «КТО ВИНОВАТ?»
...Show More Authors

The article considers the main reason for A. I. Herzen's address to obsolete words, which is their ability to acquire a stylistic coloring in the context of speech, as well as the possibility of combining, in some cases, with neutral lexemes of various functional styles. A certain stylistic effect of such characteristics of this type of vocabulary is represented, as a result of which their stylistic coloring in syntagmatic terms does not coincide with stylistic coloring in terms of paradigmatics, that is, in speech they have a completely stylistic meaning. Attention is focused on the role of outdated vocabulary, which consists in the fact that they serve to implement such features of the artistic style as imagery, emotionality, and their

... Show More
View Publication Preview PDF
Crossref