significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.
Abstract:
The research seeks to identify the role of the International Assurance Standard (3402) in the auditor's procedures, as the importance of the research stems from providing assurance services for control tools through reports that are prepared according to this standard, which contribute to strengthening audit procedures through a proposed assurance program. Many conclusions were reached, the most important of which The assurance operations are considered among the operations with a special assignme
... Show MoreFeature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreHate speech (henceforth HS) has recently spread and become an important issue. This type of speech in children's writings has a particular formulation and specific objectives that the authors intend to convey. Thus, the study aims at examining qualitatively and quantitatively the classism HS and its pragmatic functions via identifying the speech acts used to express classism HS, the implicature instigated as well as impoliteness. Since pragmatics is the study of language in context, which is greatly related to the situations and speaker’s intention, this study depends on pragmatic theoriespeech acts, impoliteness and conversational implicature) to analyze the data which are taken from Katherine Mansfield's short story (The D
... Show MoreNews headlines are key elements in spreading news. They are unique texts written in a special language which enables readers understand the overall nature and importance of the topic. However, this special language causes difficulty for readers in understanding the headline. To illuminate this difficulty, it is argued that a pragmatic analysis from a speech act theory perspective is a plausible tool for a headline analysis. The main objective of the study is to pragmatically analyze the most frequently employed types of speech acts in the news headlines covering COVID-19 in Aljazeera English website. To this end, Bach and Harnish's (1979) Taxonomy of Speech Acts has been adopted to analyze the data. Thirty headlines have been collected f
... Show MoreThe study of the " Speech act " in grammatical codes reveals great efforts in the study of the elements of linguistic communication contained in their efforts, and is part of the study of the linguistics of heritage, and the research has been designed to identify the verbal act in the blog of Ibn al-Khabaz (guiding the shine) by studying its sections comprehensively; To the spirit of grammatical discourse as well as the combination of the concept of the semantic act already verbal according to Searle, and its response in the form of indirect verbal acts more than direct acts, as well as the pure formulas of the opinions of the violators in the speech of Ibn al-Khabaz other than the proven verbal formulas Approval and approval, the class
... Show MoreIn this study was undertaken frish fish such as Bigeye Ilisha megaloptera, Nematalos nasus, Suboor Hilsha ilisha and Carp Cyprinus carpio. they were purchased from local marketes in Basrah, Oil was extracted by a solvent extraction method on low temperature. And the level of oil obtiened about (6.08; 10.72; 13.52 and 5.61)% for Bigeye, Jaffout, Suboor and Carp. the Crud oils were compared with vegetable oil (olive oil) and animal fat (tial fat mutton).
The extracted oil from fresh complete fishs with compared oils intraed on pharmacological system through packed in capsul with and with out garlic`s extract. this system analysis with chemical tests.
Results were analyzed statistically by using the SPSS program with using (CRD)
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More