An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.
This study presents a linguistic analysis of how Russian and American mainstream media and official statements deployed speech acts of accusation during the 2022 Russian invasion of Ukraine. Using Speech Act Theory (Austin, 1962; Searle, 1976) as the framework. The study analyzes 50 texts of English-language official statements and media headlines from both sides. In this research utterances are categorized into assertives, expressives, directives, commissives, and declarations, and analyzes their pragmatic force in shaping narratives. The analysis reveals contrasts in tone and rhetorical strategy: U.S. officials and media overwhelmingly use assertive accusations and expressive condemnations to morally indict Russia, while Russian counterpa
... Show MoreAbstract
Agricultural Bank is an important source of funding Specialist His role in lending to farmers, it imposes a great job in providing the necessary head for any developmental process in the agricultural sector money. The ACB of ancient Iraqi banks, and that because of its importance to the advancement of the national economy and contribute to the development and regulation of the economic sector through the support and the assignment of the Iraqi agricultural sector in various agricultural activities because it is responsible
for the process of granting agricultural loans to farmers bank.
The aim of the internal control in the agricultural banks to
... Show MoreIn this research, the influence of the orientation and distance factors on the lowest usable frequency (LUF) parameter has been studied theoretically. The calculations of the (LUF) parameter have been made using the (VOACAP) international communication model for the connection links between the capital Baghdad and many other locations that distributed on different distances and directions over the Middle East region. The results shown in this study indicate there is a slight affection of the link direction (orientation) on the LUF parameter, while the influence of the distance factor is more significant on the values of the LUF parameter. The day/night effect appears for the long distance HF links (i.e. more than a 500 Km)
Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show MoreThe Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two mai
... Show MoreBiometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in
... Show MorePalm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main
... Show More