Strings 20/11/2018. a.k.a. character arrays. Strings. Strings

Size: px
Start display at page:

Download "Strings 20/11/2018. a.k.a. character arrays. Strings. Strings"

Transcription

1 ECE 150 Fundamentals of Programming Outline 2 a.k.a. character arrays In this lesson, we will: Define strings Describe how to use character arrays for strings Look at: The length of strings Copying strings Concatenating strings Consider string operations, specifically distances Learn how to manipulate strings Look at other alphabets and Unicode Prof. Hiren Patel, Ph.D. Douglas Wilhelm Harder, M.Math. LEL hdpatel@uwaterloo.ca dwharder@uwaterloo.ca 2018 by Douglas Wilhelm Harder and Hiren Patel. Some rights reserved. 3 4 An array stores a list of values E.g., temperatures, voltages, positions, speeds, etc. Generally, each value has independent significance An array of characters, however, has the following properties: The significance comes from how the characters are strung together: post pots spot stop tops opts spto The characters come from a small alphabet If the characters of an array come from a fixed alphabet, the array is called a string of characters, or simply a string The alphabet for C++ strings is the set of all ASCII characters More inclusive strings use Unicode The length of a string is the number of characters One structure that could be used for strings is as follows: struct string_t { char *string; std::size_t length; std::size_t capacity; ; void string_init( string_t &str, std::size_t cap ) { str.capacity = cap; str.string = new char[str.capacity]; str.length = 0; The string itself may be shorter than the capacity of the array 1

2 5 6 C++ strings, however, are much simpler: They are an array of characters where the entry following the last character is the null character '\0' with a value of 0x00 '\0' must be included in the array length, but not the string length The string length is at least one less than the array length We will prefix all identifiers that are pointers to strings with "s_" Important: 'a' is a single null character "a" is an array occupying 2 bytes The first entry is 'a' and the second is '\0' Oddly enough, "\0" is an array occupying 2 bytes Both entries are '\0' We can determine the length of a string: std::size_t string_length( char *s_str ) { for ( std::size_t k{0; true; ++k ) { if ( s_str[k] == '\0' ) { return k; What happens if you forget the '\0'? 7 8 Suppose we have an argument: s_str E C E \0???? We initialize k to zero and step through the array s_str E C E \0???? Any characters after the '\0' are ignored k: 0 std::size_t string_length( char *s_str ) { for ( std::size_t k{0; true; ++k ) { if ( s_str[k] == '\0' ) { return k; std::size_t string_length( char *s_str ) { for ( std::size_t k{0; true; ++k ) { if ( s_str[k] == '\0' ) { return k; 2

3 9 10 When we get to the null character, we return: s_str E C E \0???? Question: What happens if you forget to include a null character? s_str E C E 1 5 0????? It will continue until it finds a '\0' (0x00) or it causes a segmentation fault k: 7 std::size_t string_length( char *s_str ) { for ( std::size_t k{0; true; ++k ) { if ( s_str[k] == '\0' ) { return k; std::size_t string_length( char *s_str ) { for ( std::size_t k{0; true; ++k ) { if ( s_str[k] == '\0' ) { return k; If we want to copy a string, we must determine its length and copy its characters over std::size_t length{string_length( s_str ); char *s_result{new char[length + 1]; Suppose we have an argument: s_str C + + \0 for ( std::size_t k{0; k <= length; ++k ) { s_result[k] = s_str[k]; std::size_t length{string_length( s_str ); char *s_result{new char[length + 1]; for ( std::size_t k{0; k <= length; ++k ) { s_result[k] = s_str[k]; 3

4 13 14 We find the length of the string s_str C + + \0 We allocate memory for a new array of the appropriate capacity s_str C + + \0 s_result length: 3 length: 3 std::size_t length{string_length( s_str ); char *s_result{new char[length + 1]; for ( std::size_t k{0; k <= length; ++k ) { s_result[k] = s_1[k]; std::size_t length{string_length( s_str ); char *s_result{new char[length + 1]; for ( std::size_t k{0; k <= length; ++k ) { s_result[k] = s_1[k]; Copy over the characters: s_str C + + \0 We return the address of the new array: s_str C + + \0 s_result C + + \0 s_result C + + \0 length: 3 length: 3 std::size_t length{string_length( s_str ); char *s_result{new char[length + 1]; for ( std::size_t k{0; k <= length; ++k ) { s_result[k] = s_1[k]; std::size_t length{string_length( s_str ); char *s_result{new char[length + 1]; for ( std::size_t k{0; k <= length; ++k ) { s_result[k] = s_1[k]; 4

5 17 18 If we want to concatenate two strings, we must determine the lengths and then copy them to a dynamically allocated array std::size_t length_1{string_length( s_1 ); std::size_t length_2{string_length( ); char *s_result{new char[length_1 + length_2 + 1]; Suppose we have two arguments: std::size_t k{0; for ( std::size_t i{0; i < length_1; ++i, ++k ) { for ( std::size_t i{0; i <= length_2; ++i, ++k ) { s_result[k] = [i]; std::size_t length_1{string_length( s_1 ); std::size_t length_2{string_length( ); char *s_result{new char[length_1 + length_2 + 1]; std::size_t k{0; for ( std::size_t i{0; i < length_1; ++i, ++k ) { for ( std::size_t i{0; i <= length_2; ++i, ++k ) { s_result[k] = [i]; We determine their lengths We allocate a new array length_1: 6 legnth_2: 10 std::size_t length_1{string_length( s_1 ); std::size_t length_2{string_length( ); char *s_result{new char[length_1 + length_2 + 1]; std::size_t k{0; for ( std::size_t i{0; i < length_1; ++i, ++k ) { for ( std::size_t i{0; i <= length_2; ++i, ++k ) { s_result[k] = [i]; str length_1: 6 legnth_2: std::size_t length_1{string_length( s_1 ); std::size_t length_2{string_length( ); char *s_result{new char[length_1 + length_2 + 1]; std::size_t k{0; for ( std::size_t i{0; i < length_1; ++i, ++k ) { for ( std::size_t i{0; i <= length_2; ++i, ++k ) { s_result[k] = [i]; 5

6 21 22 We copy over the first six characters: str length_1: 6 legnth_2: B j a r n e std::size_t length_1{string_length( s_1 ); std::size_t length_2{string_length( ); char *s_result{new char[length_1 + length_2 + 1]; We copy over all characters including '\0' from the second s_result length_1: 6 legnth_2: B j a r n e std::size_t length_1{string_length( s_1 ); std::size_t length_2{string_length( ); char *s_result{new char[length_1 + length_2 + 1]; std::size_t k{0; for ( std::size_t i{0; i < length_1; ++i, ++k ) { for ( std::size_t i{0; i <= length_2; ++i, ++k ) { s_result[k] = [i]; Notice we did not reset 'k' prior to starting the second loop We continue copying to where we left off std::size_t k{0; for ( std::size_t i{0; i < length_1; ++i, ++k ) { for ( std::size_t i{0; i <= length_2; ++i, ++k ) { s_result[k] = [i]; Printing of strings We return the address of the new array s_result length_1: 6 legnth_2: B j a r n e std::size_t length_1{string_length( s_1 ); std::size_t length_2{string_length( ); char *s_result{new char[length_1 + length_2 + 1]; std::size_t k{0; for ( std::size_t i{0; i < length_1; ++i, ++k ) { for ( std::size_t i{0; i <= length_2; ++i, ++k ) { s_result[k] = [i]; The std::cout object treats pointers to char as special The assumption if you want to print a pointer to a character, that that address is the address of a string If you want the address printed, you must indicate that it is a generic address: #include <iostream> int main(); Reinterpret the pointer to a char as a generic address type: void *p_generic_address; int main() { char *s_hi{"hello world!"; std::cout << s_hi << std::endl; std::cout << reinterpret_cast<void *>( s_hi ) << std::endl; return 0; Output: Hello world! 0x

7 25 26 Operations on strings Distances between strings There is a significant amount of work into strings Extracting or finding substrings Describing or finding patterns Matching case or not Defining whitespace and finding only whole words One important question is how similar are two strings? How close are two strings? Consider: "Et tu, Brute?" "t tu, Brute?" "Et ut, Brute?" "Et tu, Brune?" The Levenshtein distance is defined as the minimum number of edits required to convert one string to another One edit is defined as Inserting or removing a character Replacing a character Swapping two adjacent characters Distances between strings Distances between strings For example, you could use the Levenshtein distance to determine which words to suggest in a spell checker For example: incomprehssible is not a word, but What s wrong with this picture? incomprehssible incompressible This word is: One edit away from incompressible Two edits away from incomprehensible Recommend incompressible first incomprehssible incomprehesible incomprehensible The distance is context insensitive Ideas cannot be incompressible, so suggest the second first 7

8 29 30 Distances between strings Editing strings Recall the properties of the Euclidean distance: dist( A, B ) 0 dist( A, B ) = 0 if and only if A = B dist( A, B ) = dist( B, A ) dist( A, B ) dist( A, C ) + dist( C, A ) All of these properties hold for the Levenshtein distance between strings If we want to edit a string, it cannot be a literal string: #include <iostream> int main(); int main() { char *s_str{(char *)"Hello world."; s_str[12] = '!'; // segmentation fault!!! return 0; Editing strings Editing strings If we want to edit a string, it cannot be a literal string: #include <iostream> We can also swap two adjacent characters: #include <iostream> int main(); int main(); int main() { char *s_str{(char *)"Hello world."; std::cout << s_str << std::endl; int main() { char *s_str{(char *)"Hello wrold."; std::cout << s_str << std::endl; char *s_copy{string_copy( s_str ); // Replace the 11th character with '!' s_copy[11] = '!'; std::cout << s_copy << std::endl; delete[] s_copy; return 0; Output Hello world. Hello world! char *s_copy{string_copy( s_str ); // Swap characters 7 and 8 char ch{s_copy[8]; s_copy[8] = s_copy[7]; s_copy[7] = ch; std::cout << s_copy << std::endl; delete[] s_copy; return 0; Output Hello wrold. Hello world. 8

9 Editing strings 33 Editing strings 34 Erasing a character requires a for-loop: #include <iostream> int main(); int main() { char *s_str{(char *)"Hello world."; std::cout << s_str << std::endl; char *s_copy{string_copy( s_str ); // Remove the 5th character for ( std::size_t k{5; s_str[k]!= '\0'; ++k ) { s_copy[k] = s_copy[k + 1]; std::cout << s_copy << std::endl; delete[] s_copy; return 0; Output Hello world. Helloworld. Inserting a character requires a for-loop, but it also requires that the array is sufficiently large What happens if it is not? Exercise: What do you have to do to add two exclamation marks to the end of the string "Hello world!"? char *s_str{(char *)"Hello world!"; std::cout << s_str << std::endl; // How could you modify 'string_copy'? char *s_copy{string_copy( s_str ); Desired output: Hello world! Hello world!!! in other alphabets 35 in other alphabets 36 Other alphabets include: Morse code uses five characters: dot dash inter-character space inter-word space inter-sentence space Note: SOS is while the mayday SOS is inter-character spaces Western European alphabets often include additional characters on top of ASCII; however, Unicode allows for most alphabets German Swedish Italian Slovenian Polish Greek Russian Persian Gurmukhi ABCDEFGHIJKLMNOPQRSTUVWXYZÄÖÜß ABCDEFGHIJKLMNOPQRSTUVWXYZÅÄÖ ABCDEFGHILMNOPRSTUVZ ABCČDEFGHIJKLMNOPRSŠTUVZŽ AĄBCĆDEĘFGHIJKLŁMNŃOÓPQRSŚTUWXYZŹŻ ΑΒΓΔΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΩ АБВГДЕЁЖЗИЙКЛМНОПРСТУФХЦЧШЩъыьЭЮ Я ی ه و ن م ل گ ک ق ف غ ع ظ ط ض ص ش س ژ ز ر ذ د خ ح چ ج ث ت پ ب ا ੳਅੲਸਹਕਖਗਘਙਚਛਜਝਞਟਠਡਢਣਤਥਦਧਨਪਫਬਭਮਯਰਲਵੜ 9

10 in nature 37 Summary 38 Even better, deoxyribonucleic acid (DNA) is a string with a four-characters alphabet: cytosine C guanine G adenine A thymine T All the algorithms developed by computer scientists for analyzing and manipulating strings were immediately transferable to the analysis and manipulation of DNA This is one of the beauties of abstraction Following this lesson, you now Know that strings are sequences of characters Those characters come from a fixed alphabet Know the most primitive means of storing strings are nullcharacter-terminated arrays of char Understand how to: Calculate the length of a string Copy a string Concatenate two strings Know that the last two require dynamic memory allocation Understand string distances Are aware that Simple strings are limited to ASCII Other languages require Unicode References 39 Colophon 40 [1] No references? These slides were prepared using the Georgia typeface. Mathematical equations use Times New Roman, and source code is presented using Consolas. The photographs of lilacs in bloom appearing on the title slide and accenting the top of each other slide were taken at the Royal Botanical Gardens on May 27, 2018 by Douglas Wilhelm Harder. Please see for more information. 10

11 Disclaimer 41 These slides are provided for the ECE 150 Fundamentals of Programming course taught at the University of Waterloo. The material in it reflects the authors best judgment in light of the information available to them at the time of preparation. Any reliance on these course slides by any party for any other purpose are the responsibility of such parties. The authors accept no responsibility for damages, if any, suffered by any party as a s_result of decisions made or actions based on these course slides for any other purpose than that for which it was intended. 11

Member functions 21/11/2018. Accessing member variables. Accessing member variables

Member functions 21/11/2018. Accessing member variables. Accessing member variables ECE 150 Fundamentals of Programming Outline 2 In this lesson, we will: Describe member functions Discuss their usage Explain why this is necessary and useful Prof. Hiren Patel, Ph.D. Douglas Wilhelm Harder,

More information

Console input 26/09/2018. Background. Background

Console input 26/09/2018. Background. Background ECE 150 Fundamentals of Programming Outline 2 In this lesson, we will: Learn how to request data from the console Introduce streams and review whitespace Look at entering characters, integers, floating-point

More information

Insertion sort 20/11/2018. The idea. Example

Insertion sort 20/11/2018. The idea. Example ECE 150 Fundamentals of Programming Outline 2 In this lesson, we will: Describe the insertion sort algorithm Look at an example Determine how the algorithm work Create a flow chart Implement the algorithm

More information

Pointer arithmetic 20/11/2018. Pointer arithmetic. Pointer arithmetic

Pointer arithmetic 20/11/2018. Pointer arithmetic. Pointer arithmetic ECE 150 Fundamentals of Programming Outline 2 In this lesson, we will: Review that pointers store addresses of specific types See that we can add integers to addresses The result depends on the type See

More information

Templates 12/11/2018. Redundancy. Redundancy

Templates 12/11/2018. Redundancy. Redundancy ECE 150 Fundamentals of Programming Outline 2 In this lesson, we will: Observe that much functionality does not depend on specific types See that normally different types require different function definitions

More information

Linked Lists 28/11/2018. Nodes with member functions. The need for a linked list class

Linked Lists 28/11/2018. Nodes with member functions. The need for a linked list class ECE 150 Fundamentals of Programming Outline 2 In this lesson, we will: Create a linked list class Implement numerous member functions Explain how to step through a linked list Linked Lists Douglas Wilhelm

More information

Selection sort 20/11/2018. The idea. Example

Selection sort 20/11/2018. The idea. Example 0/11/018 ECE 150 Fundamentals of Programming Outline In this lesson, we will: Describe the selection sort algorithm Look at an example Determine how the algorithm work Create a flow chart Implement the

More information

The call stack and recursion and parameters revisited

The call stack and recursion and parameters revisited ECE 150 Fundamentals of Programming Outline 2 The call stack and recursion and parameters revisited In this lesson, we will: Describe the call stack Step through an example Observe that we can assign to

More information

Pushing at the back 28/11/2018. Problem. Our linked list class

Pushing at the back 28/11/2018. Problem. Our linked list class ECE 150 Fundamentals of Programming Outline 2 In this lesson, we will: Understand how to push a new entry onto the back of the linked list Determine how we can speed this up Understand that the cost is

More information

Main memory 05/10/2018. Main memory. Main memory

Main memory 05/10/2018. Main memory. Main memory ECE 150 Fundamentals of Programming Outline 2 In this lesson, we will: Describe main memory Define bytes and byte-addressable memory Describe how addresses are stored Describe how bytes are given addresses

More information

Integer primitive data types

Integer primitive data types ECE 150 Fundamentals of Programming Outline 2 Integer primitive data types In this lesson, we will: Learn the representation of unsigned integers Describe how integer addition and subtraction is performed

More information

Polymorphism 02/12/2018. Member functions. Member functions

Polymorphism 02/12/2018. Member functions. Member functions ECE 150 Fundamentals of Programming Outline 2 In this lesson, we will: Introduce the concept of polymorphism Look at its application in: The Shape class to determine whether or not a point is in the image

More information

Logical operators 20/09/2018. The unit pulse. Background

Logical operators 20/09/2018. The unit pulse. Background ECE 150 Fundamentals of Programming Outline In this lesson, we will: See the need for asking if more than one condition is satisfied The unit pulse function Describe the binary logical AND and OR operators

More information

Dynamic memory allocation

Dynamic memory allocation ECE 150 Fundamentals of Programming Outline 2 In this lesson, we will: Revisit static memory allocation (local variables) Introduce dynamic memory allocation Introduce the new and delete operators allocation

More information

Anatomy of a program 06/09/2018. Pre-processor directives. In this presentation, we will: Define the components of a program

Anatomy of a program 06/09/2018. Pre-processor directives. In this presentation, we will: Define the components of a program ECE 150 Fundamentals of Programming Outline 2 Anatomy of a program In this presentation, we will: Define the components of a program Pre-processor directives Statements Blocks of statements Function declarations

More information

Modeling Nasta leeq Writing Style

Modeling Nasta leeq Writing Style Modeling Nasta leeq Writing Style Aamir Wali National University of Computer and Emerging Sciences Overview: Urdu اب پ ت ٹ ث ج چ ح خ د ڑ ڈ ذ ر ز ژ س ش ص ض ط ظ ع غ ف ق ک گ ل م ن ه ء ی ے ہ ں و In Urdu, a

More information

Throwing exceptions 02/12/2018. Throwing objects. Exceptions

Throwing exceptions 02/12/2018. Throwing objects. Exceptions ECE 150 Fundamentals of Programming Outline 2 In this lesson, we will: See that we can throw objects Know that there are classes defined in the standard template library These classes allow more information

More information

Binary and hexadecimal numbers

Binary and hexadecimal numbers ECE 150 Fundamentals of Programming Outline 2 Binary and hexadecimal numbers In this lesson, we will: Learn about the binary numbers (bits) 0 and 1 See that we can represent numbers in binary Quickly introduce

More information

The structured programming theorem

The structured programming theorem ECE 150 Fundamentals of Programming Outline 2 The structured programming theorem In this lesson, we will: Review the statements we have seen to this point Look at some very ugly flow charts apparently

More information

REEM READYMIX Brand Guideline

REEM READYMIX Brand Guideline REEM READYMIX Brand Guideline Implementing Reem Readymix brand in communications V.I - February 2018 Introduction Reem Readymix is a leading supplier of all types of readymix concrete and cementbased plastering

More information

Identity Guidelines. December 2012

Identity Guidelines. December 2012 Identity Guidelines December 2012 Identity Guidelines Contents 1.0 Our Logo Our logo Our wordmark Colour treatments Clear space, large and small sizes Correct logo placement Incorrect logo usage 2.0 Colour

More information

Umbrella. Branding & Guideline

Umbrella. Branding & Guideline Umbrella. Branding & Guideline OUR LOGO. OUR COLORS. #FFFFFF Font COLOR #2A3942 #64A0C6 mix color C: 75% M: 68% Y: 67% K: 90% H: 320 S:61% B:0 R:0 G:0 B:0 C: 75% M: 68% Y: 67% K: 90% H: 320 S:61% B:0 R:0

More information

Arabic Text Segmentation

Arabic Text Segmentation Arabic Text Segmentation By Dr. Salah M. Rahal King Saud University-KSA 1 OCR for Arabic Language Outline Introduction. Arabic Language Arabic Language Features. Challenges for Arabic OCR. OCR System Stages.

More information

OUR LOGO. SYMBOL LOGO SYMBOL LOGO ORIGINAL STRUCTURE

OUR LOGO. SYMBOL LOGO SYMBOL LOGO ORIGINAL STRUCTURE OUR LOGO. ORIGINAL STRUCTURE SYMBOL LOGO SYMBOL LOGO OUR COLORS. Infographic Color 2A3942 FED708 2A3942 E77525 804D9F CLEAR SPACE. PRINT SAFE AREA MINIMUM SIZE - PRINT H: 30 pt ONLINE SAFE AREA MINIMUM

More information

Improved Method for Sliding Window Printed Arabic OCR

Improved Method for Sliding Window Printed Arabic OCR th Int'l Conference on Advances in Engineering Sciences & Applied Mathematics (ICAESAM'1) Dec. -9, 1 Kuala Lumpur (Malaysia) Improved Method for Sliding Window Printed Arabic OCR Prof. Wajdi S. Besbas

More information

VOL. 3, NO. 7, Juyl 2012 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

VOL. 3, NO. 7, Juyl 2012 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Arabic Hand Written Character Recognition Using Modified Multi-Neural Network Farah Hanna Zawaideh Irbid National University, Computer Information System Department dr.farahzawaideh@inu.edu.jo ABSTRACT

More information

L2/11-033R 1 Introduction

L2/11-033R 1 Introduction To: UTC and ISO/IEC JTC1/SC2 WG2 Title: Proposal to add ARABIC MARK SIDEWAYS NOON GHUNNA From: Lorna A. Priest (SIL International) Date: 10 February 2011 1 Introduction ARABIC MARK SIDEWAYS NOON GHUNNA

More information

THE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines

THE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines BRAND GUIDELINES THE LOGO Guidelines LOGO SYMBOL TYPEFACE 2 COLOR SCHEME When do I use the full-color logo? Use the full-color logo as frequently as possible to maximize and strengthen the brand. PRIMARY

More information

qatar national day 2017 brand guidelines 2017

qatar national day 2017 brand guidelines 2017 2017 brand guidelines 2017 the following guidelines demonstrate how best to apply the brand 2 CONTENTS 3 contents p5. vision & mission p7. logo p8. logo rationale p9. logo clear space p10. logo do s p11.

More information

GEOMETRIC-TOPOLOGICAL BASED ARABIC CHARACTER RECOGNITION, A NEW APPROACH

GEOMETRIC-TOPOLOGICAL BASED ARABIC CHARACTER RECOGNITION, A NEW APPROACH GEOMETRIC-TOPOLOGICAL BASED ARABIC CHARACTER RECOGNITION, A NEW APPROACH HAMED TIRANDAZ, MOHSEN AHMADNIA AND HAMIDREZA TAVAKOLI Electrical and Computer Engineering Department, Hakim Sabzevari University,

More information

Main Brandmark. Alternative option 1: White torch and white logotype on orange background

Main Brandmark. Alternative option 1: White torch and white logotype on orange background Style Guide Main Brandmark Torch Logotype Preferred brandmark The RFE/RL brandmark consists of two elements 1) the torch and 2) the Radio Free Europe/ Radio Liberty logotype. These two elements should

More information

BRAND GUIDELINES JANUARY 2017

BRAND GUIDELINES JANUARY 2017 BRAND GUIDELINES JANUARY 2017 GETTING AROUND Page 03 05 06 07 08 09 10 12 14 15 Section 01 - Our Logo 02 - Logo Don ts 03 - Our Colors 04 - Our Typeface 06 - Our Art Style 06 - Pictures 07 - Call to Action

More information

Nafees Nastaleeq v1.01 beta

Nafees Nastaleeq v1.01 beta Nafees Nastaleeq v1.01 beta Release Notes November 07, 2007 CENTER FOR RESEARCH IN URDU LANGUAGE PROCESSING NATIONAL UNIVERSITY OF COMPUTER AND EMERGING SCIENCES, LAHORE PAKISTAN Table of Contents 1 Introduction...4

More information

Proposed keyboard layout for Swahili in Arabic script

Proposed keyboard layout for Swahili in Arabic script أ Proposed keyboard layout for Swahili in Arabic script Kevin Donnelly kevin@dotmon.com Version 0.1, March 2010 Introduction Swahili was originally written in Arabic script in its area of origin (the littoral

More information

Persian/Arabic Baffletext CAPTCHA 1

Persian/Arabic Baffletext CAPTCHA 1 Journal of Universal Computer Science, vol. 12, no. 12 (2006), 1783-1796 submitted: 20/3/06, accepted: 22/12/06, appeared: 28/12/06 J.UCS Persian/Arabic Baffletext CAPTCHA 1 Mohammad Hassan Shirali-Shahreza

More information

1 See footnote 2, below.

1 See footnote 2, below. To: UTC From: Azzeddine Lazrek, Cadi Ayyad University, Marrakesh, Morocco (with Debbie Anderson, SEI, UC Berkeley, and with assistance from Murray Sargent, Laurentiu Iancu, and others) RE: Arabic Math

More information

1. Brand Identity Guidelines.

1. Brand Identity Guidelines. 1. Brand Identity Guidelines 1.1 HCT Logo 2. Secondary left aligned for English language literature 1. Primary centre aligned stacked formal 3. Secondary right aligned for Arabic language literature 4.

More information

SCALE-SPACE APPROACH FOR CHARACTER SEGMENTATION IN SCANNED IMAGES OF ARABIC DOCUMENTS

SCALE-SPACE APPROACH FOR CHARACTER SEGMENTATION IN SCANNED IMAGES OF ARABIC DOCUMENTS 31 st December 016. Vol.94. No. 005-016 JATIT & LLS. All rights reserved. ISSN: 199-8645 www.jatit.org E-ISSN: 1817-3195 SCALE-SPACE APPROACH FOR CHARACTER SEGMENTATION IN SCANNED IMAGES OF ARABIC DOCUMENTS

More information

A MELIORATED KASHIDA-BASED APPROACH FOR ARABIC TEXT STEGANOGRAPHY

A MELIORATED KASHIDA-BASED APPROACH FOR ARABIC TEXT STEGANOGRAPHY A MELIORATED KASHIDA-BASED APPROACH FOR ARABIC TEXT STEGANOGRAPHY Ala'a M. Alhusban and Jehad Q. Odeh Alnihoud Computer Science Dept, Al al-bayt University, Mafraq, Jordan ABSTRACT Steganography is an

More information

Online Arabic Handwritten Character Recognition Based on a Rule Based Approach

Online Arabic Handwritten Character Recognition Based on a Rule Based Approach Journal of Computer Science 2012, 8 (11), 1859-1868 ISSN 1549-3636 2012 doi:10.3844/jcssp.2012.1859.1868 Published Online 8 (11) 2012 (http://www.thescipub.com/jcs.toc) Online Arabic Handwritten Character

More information

SHEFA STORE CORPORATE DESIGN MANUAL BRAND & FUNCTION // CORPORATE DESIGN GUIDELINES. 01 : Corporate Identity. 02 : Corporate Stationery

SHEFA STORE CORPORATE DESIGN MANUAL BRAND & FUNCTION // CORPORATE DESIGN GUIDELINES. 01 : Corporate Identity. 02 : Corporate Stationery BRAND & FUNCTION // CORPORATE DESIGN GUIDELINES SHEFA STORE CORPORATE DESIGN MANUAL 01 : Corporate Identity 02 : Corporate Stationery 03 : Interactive Designs www.shefa-store.com Corporate Identity 01

More information

THE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines

THE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines BRAND GUIDELINES THE LOGO Guidelines LOGO SYMBOL TYPEFACE 2 COLOR SCHEME When do I use the full-color logo? Use the full-color logo as frequently as possible to maximize and strengthen the brand. PRIMARY

More information

Different Input Systems for Different Devices

Different Input Systems for Different Devices Different Input Systems for Different Devices Optimized Urdu Touch-Screen Keypad Designs Asad Habib, Masakazu Iwatate, Masayuki Asahara and Yuji Matsumoto Graduate School of Information Science Nara Institute

More information

ISO/IEC JTC 1/SC 2. Yoshiki MIKAMI, SC 2 Chair Toshiko KIMURA, SC 2 Secretariat JTC 1 Plenary 2012/11/05-10, Jeju

ISO/IEC JTC 1/SC 2. Yoshiki MIKAMI, SC 2 Chair Toshiko KIMURA, SC 2 Secretariat JTC 1 Plenary 2012/11/05-10, Jeju ISO/IEC JTC 1/SC 2 Yoshiki MIKAMI, SC 2 Chair Toshiko KIMURA, SC 2 Secretariat 2012 JTC 1 Plenary 2012/11/05-10, Jeju what is new Work items ISO/IEC 10646 2 nd ed. 3 rd ed. (2012) ISO/IEC 14651 Amd.1-2

More information

ب ام خذا ذ بخش ذ ه زباى

ب ام خذا ذ بخش ذ ه زباى ب ام خذا ذ بخش ذ ه زباى ع اى هذرک : بز اه یسی PLC FATEK ایجاد ارتباط با FATEK PLC 9 1 ا.رضایی 1391.7.27 ت ضیحات : تعذاد صفح : شوار یزایش : یزایش ک ذ : تاریخ یزایش : +9821-228-831-70 1 www.dornamehr.com

More information

New Features in mpdf v5.6

New Features in mpdf v5.6 New Features in mpdf v5.6 HTML5 tags New tags introduced in HTML5 now have basic support in mpdf, and will thus support CSS style references. The following are treated as block elements similar to :

More information

Segmentation and Recognition of Arabic Printed Script

Segmentation and Recognition of Arabic Printed Script Institute of Advanced Engineering and Science IAES International Journal of Artificial Intelligence (IJ-AI) Vol. 2, No. 1, March 2013, pp. 20~26 ISSN: 2252-8938 20 Segmentation and Recognition of Arabic

More information

androidcode.ir/post/install-eclipse-windows-android-lynda

androidcode.ir/post/install-eclipse-windows-android-lynda ا موزش برنامه نويسی اندرويد آ زش ای ا رو ز ن ر دو, ۲۶ دی ۰۷:۰۶ ۱۳۹۰ ب.ظ مراحل نصب ايکليپس (Eclipse) روی ويندوز ی ) ( آ زش ا ا در و وز در pdf ا آ زش( 2.43 ( ۰. از ا اس دی رو ده (راھ ی.(SDK ۱.ا ای ا رو ازش

More information

American University of Beirut Logo and Visual Identity Manual. April 2011 version 1.0

American University of Beirut Logo and Visual Identity Manual. April 2011 version 1.0 American University of Beirut Logo and Visual Identity Manual April 2011 version 1.0 Contents Introduction Why a Visual Identity System...4 Visual Identity Policy...4 AUB Logo AUB Logo...6 General Guidelines...7

More information

Handwritten Character Recognition Based on the Specificity and the Singularity of the Arabic Language

Handwritten Character Recognition Based on the Specificity and the Singularity of the Arabic Language Handwritten Character Recognition Based on the Specificity and the Singularity of the Arabic Language Youssef Boulid 1, Abdelghani Souhar 2, Mohamed Youssfi Elkettani 1 1 Department of Mathematics, Faculty

More information

Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation

Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation S. M. Hadi, S. Murtatha Department of Information & Comm. Eng. College of Engineering Al- Khawarizmi,University of Baghdad

More information

Character Set Supported by Mehr Nastaliq Web beta version

Character Set Supported by Mehr Nastaliq Web beta version Character Set Supported by Mehr Nastaliq Web beta version Sr. No. Character Unicode Description 1 U+0020 Space 2! U+0021 Exclamation Mark 3 " U+0022 Quotation Mark 4 # U+0023 Number Sign 5 $ U+0024 Dollar

More information

Proposed Solution for Writing Domain Names in Different Arabic Script Based Languages

Proposed Solution for Writing Domain Names in Different Arabic Script Based Languages Proposed Solution for Writing Domain Names in Different Arabic Script Based Languages TF-AIDN, June/2014 Presented by AbdulRahman I. Al-Ghadir Researcher in SaudiNIC Content What we have done so far? Problem

More information

Peripheral Contour Feature Based On-line Handwritten Uyghur Character Recognition

Peripheral Contour Feature Based On-line Handwritten Uyghur Character Recognition www.ijcsi.org 273 eripheral Contour Feature Based On-line Handwritten Uyghur Character Recognition Zulpiya KAHAR 1, Mayire IBRAYIM 2, Dilmurat TURSUN 3 and Askar HAMDUA 4,* 1 Institute of Information Science

More information

Urdu Usage Guide ر ہاردو

Urdu Usage Guide ر ہاردو ب" Urdu Usage Guide و 6 اردو ر This guide will explain how to use Urdu on the computer. After Urdu support has been installed and it is possible to toggle between English and Urdu, two additional items

More information

USING COMBINATION METHODS FOR AUTOMATIC RECOGNITION OF WORDS IN ARABIC

USING COMBINATION METHODS FOR AUTOMATIC RECOGNITION OF WORDS IN ARABIC USING COMBINATION METHODS FOR AUTOMATIC RECOGNITION OF WORDS IN ARABIC 1 AHLAM MAQQOR, 2 AKRAM HALLI, 3 KHALID SATORI, 4 HAMID TAIRI 1,2,3,4 Sidi Mohamed Ben Abdellah University, Faculty of Science Dhar

More information

Award Winning Typefaces by Linotype

Award Winning Typefaces by Linotype Newly released fonts and Midan awarded coveted design prize Award Winning Typefaces by Linotype Bad Homburg, 23 April 2007. Linotype has once again received critical recognition for their commitment to

More information

Research Article Offline Handwritten Arabic Character Recognition Using Features Extracted from Curvelet and Spatial Domains

Research Article Offline Handwritten Arabic Character Recognition Using Features Extracted from Curvelet and Spatial Domains Research Journal of Applied Sciences, Engineering and Technology 11(2): 158-164, 2015 DOI: 10.19026/rjaset.11.1702 ISSN: 2040-7459; e-issn: 2040-7467 2015 Maxwell Scientific Publication Corp. Submitted:

More information

Writing Domain Names in Different Arabic Script Based Languages

Writing Domain Names in Different Arabic Script Based Languages Writing Domain Names in Different Arabic Script Based Languages Language VS. Script ICANN Regional Meeting, Dubai April 1-3 2008 Dr. Abdulaziz H. Al-Zoman Director of SaudiNIC - CITC Chairman of Steering

More information

ISeCure. The ISC Int'l Journal of Information Security. High Capacity Steganography Tool for Arabic Text Using Kashida.

ISeCure. The ISC Int'l Journal of Information Security. High Capacity Steganography Tool for Arabic Text Using Kashida. The ISC Int'l Journal of Information Security July 2010, Volume 2, Number 2 (pp. 107 118) http://www.isecure-journal.org High Capacity Steganography Tool for Arabic Text Using Kashida Adnan Abdul-Aziz

More information

Enabling Complex Asian Scripts on Mobile Devices

Enabling Complex Asian Scripts on Mobile Devices Enabling Complex Asian Scripts on Mobile Devices Waqar Ahmad Computer Science Department, National University of Computer and Emerging Sciences, Lahore, Pakistan waqar.ahmad@nu.edu.pk Sarmad Hussain Center

More information

Brand Identity Manual Fonts and Typography

Brand Identity Manual Fonts and Typography Brand Identity Manual Fonts and Typography Brand Fonts NCB TYPE LANGUAGE To maintain a coherent brand identity, NCB uses a set of compatible and typefaces as its corporate primary fonts. These adjacent

More information

BÉZIER CURVES TO RECOGNIZE MULTI-FONT ARABIC ISOLATED CHARACTERS

BÉZIER CURVES TO RECOGNIZE MULTI-FONT ARABIC ISOLATED CHARACTERS BÉZIER CURVES TO RECOGNIZE MULTI-FONT ARABIC ISOLATED CHARACTERS AzzedineMazroui and AissaKerkourElmiad Faculty of Sciences, Oujda, Morroco azze.mazroui@gmail.com, kerkour8@yahoo.fr ABSTRACT The recognition

More information

Exercise 1.1 Hello world

Exercise 1.1 Hello world Exercise 1.1 Hello world The goal of this exercise is to verify that computer and compiler setup are functioning correctly. To verify that your setup runs fine, compile and run the hello world example

More information

ERD ENTITY RELATIONSHIP DIAGRAM

ERD ENTITY RELATIONSHIP DIAGRAM ENTITY RELATIONSHIP DIAGRAM M. Rasti-Barzoki Website: Entity Relationship Diagrams for Data Modelling An Entity-Relationship Diagram () shows how the data that flows in the system is organised and used.

More information

Dr. S. Saiedinezhad ضز ع اضتغال : گز تخصصی : آ الیش رتث ػلوی : استادیار

Dr. S. Saiedinezhad ضز ع اضتغال : گز تخصصی : آ الیش رتث ػلوی : استادیار Dr. S. Saiedinezhad دکتز سوی سؼیذی ضاد ضز ع اضتغال : ت وي 91 گز تخصصی : آ الیش رتث ػلوی : استادیار آ الیش تغییزات هؼادالت دیفزا سیل تا هطتقات جشئی فضا ای س ت ل ف فضا ای زم دار احتوالی Variational analysis,

More information

Printed and Handwritten Arabic Characters Recognition and Convert It to Editable Text Using K-NN and Fuzzy Logic Classifiers

Printed and Handwritten Arabic Characters Recognition and Convert It to Editable Text Using K-NN and Fuzzy Logic Classifiers Journal of University of Thi-Qar Vol.9 No. Mar.4 Printed and Handwritten Arabic Characters Recognition and Convert It to Editable Text Using K-NN and Fuzzy Logic Classifiers Zamen F. Jaber Computer Department,

More information

Center for Language Engineering Al-Khawarizmi Institute of Computer Science University of Engineering and Technology, Lahore

Center for Language Engineering Al-Khawarizmi Institute of Computer Science University of Engineering and Technology, Lahore Sarmad Hussain Sarmad Hussain Center for Language Engineering Al-Khawarizmi Institute of Computer Science University of Engineering and Technology, Lahore www.cle.org.pk sarmad@cantab.net Arabic Script

More information

Introduction to Search and Recommendation

Introduction to Search and Recommendation Introduction to Search and Recommendation Yi Zhang Associate Professor Information Retrieval and Knowledge Management Lab Graduate Director, Technology and Information Management University of California

More information

Nastaliq Font. Shahab Mohsen. A thesis. presented to the University of Waterloo. in fulfillment of the. thesis requirement for the degree of

Nastaliq Font. Shahab Mohsen. A thesis. presented to the University of Waterloo. in fulfillment of the. thesis requirement for the degree of The Problem of Stretching in Persian Calligraphy and a New Type 3 PostScript Nastaliq Font by Shahab Mohsen A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for

More information

3 Qurʾānic typography Qurʾānic typography involves getting the following tasks done.

3 Qurʾānic typography Qurʾānic typography involves getting the following tasks done. TUGboat, Volume 31 (2010), No. 2 197 Qurʾānic typography comes of age: Æsthetics, layering, and paragraph optimization in ConTEXt Idris Samawi Hamid 1 The background of Oriental TEX Attempts to integrate

More information

NASTAALIGH HANDWRITTEN WORD RECOGNITION USING A CONTINUOUS-DENSITY VARIABLE-DURATION HMM

NASTAALIGH HANDWRITTEN WORD RECOGNITION USING A CONTINUOUS-DENSITY VARIABLE-DURATION HMM NASTAALIGH HANDWRITTEN WORD RECOGNITION USING A CONTINUOUS-DENSITY VARIABLE-DURATION HMM Reza Safabakhsh and Peyman Adibi Computational Vision/Intelligence Laboratory Computer Engineering Department, Amirkabir

More information

A) 9 B) 12 C) 24 D) 32 A) 9 B) 7 C) 8 D) 12 A) 400 B) 420 C) 460 D) 480 A) 16 B) 12 C) 8 D) 4. A) n+1 B) n - 1 C) n D) None of the above

A) 9 B) 12 C) 24 D) 32 A) 9 B) 7 C) 8 D) 12 A) 400 B) 420 C) 460 D) 480 A) 16 B) 12 C) 8 D) 4. A) n+1 B) n - 1 C) n D) None of the above 1 4 4 ادب ر اور 2.ر ں رHistory3 ا ض ا رس ا ا ب A) 9 B) 12 C) 24 D) 32 ال 1 ں ا ا ر فا رس ا ب A) 9 B) 7 C) 8 D) 12 "BENZENE" وف ا ل ت ا ظ A) 400 B) 420 C) 460 D) 480 1 2 3 C B A اور D ں combinations ا 3

More information

Feature Extraction Techniques of Online Handwriting Arabic Text Recognition

Feature Extraction Techniques of Online Handwriting Arabic Text Recognition 2013 5th International Conference on Information and Communication Technology for the Muslim World. Feature Extraction Techniques of Online Handwriting Arabic Text Recognition Mustafa Ali Abuzaraida 1,

More information

SHARP-EDGES METHOD IN ARABIC TEXT STEGANOGRAPHY

SHARP-EDGES METHOD IN ARABIC TEXT STEGANOGRAPHY SHARP-EDGES METHOD IN ARABIC TEXT STEGANOGRAPHY 1 NUUR ALIFAH ROSLAN, 2 RAMLAN MAHMOD, NUR IZURA UDZIR 3 1 Department of Multimedia, FSKTM, UPM, Malaysia-43400 2 Prof, Department of Multimedia, FSKTM,

More information

Multifont Arabic Characters Recognition Using HoughTransform and HMM/ANN Classification

Multifont Arabic Characters Recognition Using HoughTransform and HMM/ANN Classification 50 JOURNAL OF MULTIMEDIA, VOL. 1, NO. 2, MAY 2006 Multifont Arabic Characters Recognition Using HoughTransform and HMM/ANN Classification Nadia Ben Amor National Engineering School of Tunis, Tunisia n.benamor@ttnet.tn,

More information

JTC1/SC2/WG2 N Introduction

JTC1/SC2/WG2 N Introduction JTC1/SC2/WG2 N3882 To: UTC and ISO/IEC JTC1/SC2 WG2 Title: Proposal to add Arabic script characters for African and Asian languages From: Lorna A. Priest, Martin Hosken (SIL International) Date: 12 August

More information

A Proposed Hybrid Technique for Recognizing Arabic Characters

A Proposed Hybrid Technique for Recognizing Arabic Characters A Proposed Hybrid Technique for Recognizing Arabic Characters S.F. Bahgat, S.Ghomiemy Computer Eng. Dept. College of Computers and Information Technology Taif University Taif, Saudi Arabia S. Aljahdali,

More information

MEMORANDUM OF UNDERSTANDING. between [PLEASE INSERT NAME OF THE OVERSEAS GOVERNMENT AGENCY AND NAME OF THE COUNTRY] and

MEMORANDUM OF UNDERSTANDING. between [PLEASE INSERT NAME OF THE OVERSEAS GOVERNMENT AGENCY AND NAME OF THE COUNTRY] and MEMORANDUM OF UNDERSTANDING between [PLEASE INSERT NAME OF THE OVERSEAS GOVERNMENT AGENCY AND NAME OF THE COUNTRY] and THE PUBLIC PRIVATE PARTNERSHIP AUTHORITY, PRIME MINISTER S OFFICE, THE PEOPLE'S REPUBLIC

More information

CS501- Advance Computer Architecture Solved Objective Midterm Papers For Preparation of Midterm Exam

CS501- Advance Computer Architecture Solved Objective Midterm Papers For Preparation of Midterm Exam CS501- Advance Computer Architecture Solved Objective Midterm Papers For Preparation of Midterm Exam Question No: 1 ( Marks: 1 ) - Please choose one For any of the instructions that are a part of the instruction

More information

DESIGNING OFFLINE ARABIC HANDWRITTEN ISOLATED CHARACTER RECOGNITION SYSTEM USING ARTIFICIAL NEURAL NETWORK APPROACH. Ahmed Subhi Abdalkafor 1*

DESIGNING OFFLINE ARABIC HANDWRITTEN ISOLATED CHARACTER RECOGNITION SYSTEM USING ARTIFICIAL NEURAL NETWORK APPROACH. Ahmed Subhi Abdalkafor 1* International Journal of Technology (2017) 3: 528-538 ISSN 2086-9614 IJTech 2017 DESIGNING OFFLINE ARABIC HANDWRITTEN ISOLATED CHARACTER RECOGNITION SYSTEM USING ARTIFICIAL NEURAL NETWORK APPROACH Ahmed

More information

CH. 2 Network Models

CH. 2 Network Models Islamic University of Gaza Faculty of Engineering Computer Engineering Department Data com. Discussion ECOM 4014 Lecture # 2 CH. 2 Network Models By Eng. Wafaa Audah Sep. 2013 OSI Model Open Systems Interconnection

More information

Managing Resource Sharing Conflicts in an Open Embedded Software Environment

Managing Resource Sharing Conflicts in an Open Embedded Software Environment Managing Resource Sharing Conflicts in an Open Embedded Software Environment Koutheir Attouchi To cite this version: Koutheir Attouchi. Managing Resource Sharing Conflicts in an Open Embedded Software

More information

Recognition of secondary characters in handwritten Arabic using Fuzzy Logic

Recognition of secondary characters in handwritten Arabic using Fuzzy Logic International Conference on Machine Intelligence (ICMI 05), Tozeur, Tunisia, 2005 Recognition of secondary characters in handwritten Arabic using Fuzzy Logic Mohammed Zeki Khedher1 Ghayda Al-Talib2 1 Faculty

More information

Computers Programming Course 10. Iulian Năstac

Computers Programming Course 10. Iulian Năstac Computers Programming Course 10 Iulian Năstac Recap from previous course 5. Values returned by a function A return statement causes execution to leave the current subroutine and resume at the point in

More information

PERFORMANCE OF THE GOOGLE DESKTOP, ARABIC GOOGLE DESKTOP AND PEER TO PEER APPLICATION IN ARABIC LANGUAGE

PERFORMANCE OF THE GOOGLE DESKTOP, ARABIC GOOGLE DESKTOP AND PEER TO PEER APPLICATION IN ARABIC LANGUAGE PERFORMANCE OF THE GOOGLE DESKTOP, ARABIC GOOGLE DESKTOP AND PEER TO PEER APPLICATION IN ARABIC LANGUAGE Abd El Salam AL HAJJAR, Anis ISMAIL, Mohammad HAJJAR, Mazen EL- SAYED University Institute of TechnologyLebanese

More information

Domain Names in Pakistani Languages. IDNs for Pakistani Languages

Domain Names in Pakistani Languages. IDNs for Pakistani Languages ا ہ 6 5 a ز @ ں ب Domain Names in Pakistani Languages س a ی س a ب او اور را < ہ ر @ س a آف ا ر ا 6 ب 1 Domain name Domain name is the address of the web page pg on which the content is located 2 Internationalized

More information

CS242 COMPUTER PROGRAMMING

CS242 COMPUTER PROGRAMMING CS242 COMPUTER PROGRAMMING I.Safa a Alawneh Variables Outline 2 Data Type C++ Built-in Data Types o o o o bool Data Type char Data Type int Data Type Floating-Point Data Types Variable Declaration Initializing

More information

Intermediate Programming, Spring 2017*

Intermediate Programming, Spring 2017* 600.120 Intermediate Programming, Spring 2017* Misha Kazhdan *Much of the code in these examples is not commented because it would otherwise not fit on the slides. This is bad coding practice in general

More information

The string Class. Lecture 21 Sections 2.9, 3.9, Robb T. Koether. Wed, Oct 17, Hampden-Sydney College

The string Class. Lecture 21 Sections 2.9, 3.9, Robb T. Koether. Wed, Oct 17, Hampden-Sydney College The string Class Lecture 21 Sections 2.9, 3.9, 3.10 Robb T. Koether Hampden-Sydney College Wed, Oct 17, 2018 Robb T. Koether (Hampden-Sydney College) The string Class Wed, Oct 17, 2018 1 / 18 1 The String

More information

M. Rasti-Barzoki rasti.iut.ac.ir Management Information Systems

M. Rasti-Barzoki rasti.iut.ac.ir Management Information Systems M. Rasti-Barzoki Management Information Systems : Data Flow Diagram PFD: Process Flow Diagram (PM: Process Model) FHD: Function Hierarchy Diagram DT: Decision Table 2 Entity Attribute 3 Data Elements The

More information

A Proposed UNICODE-Based Extended Romanization System for Persian Texts. M. A. Mahdavi, Ph.D. Imam Khomeini International University, Iran

A Proposed UNICODE-Based Extended Romanization System for Persian Texts. M. A. Mahdavi, Ph.D. Imam Khomeini International University, Iran International Journal of Information Science and Management A Proposed UNICODE-Based Extended Romanization System for Persian Texts M. A. Mahdavi, Ph.D. Imam Khomeini International University, Iran Email:

More information

2011 International Conference on Document Analysis and Recognition

2011 International Conference on Document Analysis and Recognition 20 International Conference on Document Analysis and Recognition On-line Arabic Handwrittenn Personal Names Recognition System based b on HMM Sherif Abdelazeem, Hesham M. Eraqi Electronics Engineering

More information

Introduction to Search/Retrieval Technologies. Yi Zhang Information System and Technology Management IRKM Lab University of California Santa Cruz

Introduction to Search/Retrieval Technologies. Yi Zhang Information System and Technology Management IRKM Lab University of California Santa Cruz Introduction to Search/Retrieval Technologies Yi Zhang Information System and Technology Management IRKM Lab University of California Santa Cruz 1 Information Retrieval and Knowledge Management Lab Focus:

More information

Unit 14. Passing Arrays & C++ Strings

Unit 14. Passing Arrays & C++ Strings 1 Unit 14 Passing Arrays & C++ Strings PASSING ARRAYS 2 3 Passing Arrays As Arguments Can we pass an array to another function? YES!! Syntax: Step 1: In the prototype/signature: Put empty square brackets

More information

Engineering Problem Solving with C++, Etter

Engineering Problem Solving with C++, Etter Engineering Problem Solving with C++, Etter Chapter 6 Strings 11-30-12 1 One Dimensional Arrays Character Strings The string Class. 2 C style strings functions defined in cstring CHARACTER STRINGS 3 C

More information

ON OPTICAL CHARACTER RECOGNITION OF ARABIC TEXT

ON OPTICAL CHARACTER RECOGNITION OF ARABIC TEXT The 6th Saudi Engineering Conference, KFUPM, Dhahran, December 2002 Vol. 4. 109 ON OPTICAL CHARACTER RECOGNITION OF ARABIC TEXT Abdelmalek Zidouri 1, Muhammad Sarfraz 2 1: Assistant professor, Electrical

More information

Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub

Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub King Fahd University of Petroleum and Minerals Computer Engineering Department Dhahran

More information

Image Coloring using Genetic Algorithm

Image Coloring using Genetic Algorithm Republic of Iraq Ministry of Higher Education And Scientific Research Baghdad University College of Science Image Coloring using Genetic Algorithm A Project Report Submitted to the College of Science,

More information

ISO/IEC JTC 1/SC 2/WG 2 PROPOSAL SUMMARY FORM TO ACCOMPANY SUBMISSIONS 1. T Uhttp://www.dkuug.dk/JTC1/SC2/WG2/docs/summaryform.

ISO/IEC JTC 1/SC 2/WG 2 PROPOSAL SUMMARY FORM TO ACCOMPANY SUBMISSIONS 1. T Uhttp://www.dkuug.dk/JTC1/SC2/WG2/docs/summaryform. T P P T Form T Uhttp://www.unicode.org/Public/UNIDATA/UCD.html T Uhttp://www.dkuug.dk/JTC1/SC2/WG2/docs/roadmaps.html T Uhttp://www.unicode.org T Uhttp://www.dkuug.dk/JTC1/SC2/WG2/docs/summaryform.html

More information