With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreGraphic design art depends on changeable cognitive systems which their relation and items relying on the accumulation of humane knowledge and thong and the humane look to the venality and his explanation to the relation between him and the venality , then the graphic design art becomes an important item of this accumulation knowledge besides , it is on kind of knowledge kinds . The technological advancement in communication lauds to increasing in communication media and design methods , where the computer and its application in graphic design promotes the design process because of it's capalebities which lead to in creasing in production process , minimizing the cost and time and achieving creative and aesthetic aspect because of it's fe
... Show MoreThe topic of supra.topological.spaces considered one of the important topics because it is a generalization to topological.spaces. Many researchers have presented generalizations to supra open sets such as supra semi.open and supra pre.open sets and others. In this paper, the concept of δ∼open sets was employed and introduced in to the concept of supra topology and a new type of open set was extracted, which was named S∼δ∼open. Our research entails the utilization of this category of sets to form a new concepts in these spaces, namely S∼δ∼limit points and S∼δ∼derive points, and examining its relationship with S∼open and S∼reg∼open. Based on this class of sets, we have introduced other new concepts such as S∼isolate
... Show MoreThis research is a pragmatic study of political blame in British and Iraqi Parliaments. It aims to unfold the similarities and/or differences in terms of the pragmatic and pragma-rhetorical strategies used by British and Iraqi politicians when they exchange blame in both offensive and defensive situations. A statistical analysis is conducted to quantitatively support the findings of the pragmatic analysis. The analyses conducted have yielded different results among blame is a process composed of two stages. Each stage is distinct for its pragmatic components and pragma-rhetorical strategies. British and Iraqi MPs at the blame stage tend to utilize impoliteness as their main strategy. However, British and Iraqi MPs perform differently at the
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MorePhysicians are infrequently selected to serve in the yearlong role of Jefferson Science Fellow (JSF) as senior science advisor for the US Department of State or the United States Agency for International Development. The authors discuss the role of a JSF in promoting “science diplomacy” from the perspective of one alumnus, who sites examples of ongoing, long-term collaborative projects including one focusing on medical education reform in Iraq that would not have been possible without the JSF program. More than 3 decades of political and social unrest, terrorism, the internal displacement of millions of Iraqi citizens, the arrival of Syrian refugees, international sanctions, and the effect of fluctuating oil prices that fund education i
... Show MoreOne of the management accounting tools is responsible accounting. In this system, the organisation is divided into responsibility centres that help to connect an individual performance responsible to perform through a combined system of reports according to the implementation of the mechanism of exception tools which gives assistance in planning. The exploitation of the organisation's available resources is achieved through the application of responsible accounting. Also, the best exploitation will lead to the provision of low-cost products through the disposal of all types of waste or loss during the cost centres. By providing products at a lower cost and satisfying the wishes of the needs of customers, the result reflects the competitive
... Show MoreAbstract:
The research aims to diagnose the relationship between the environmental tax and the development of the sustainable social dimension, where the environmental tax is considered a tool in promoting sustainable development according to its economic, social and environmental dimensions through the application of legislation and instructions for environmental protection, and that imposing an environmental tax will have a clear impact in achieving the dimensions of sustainable development and compliance With regard to the social dimension, the research relied on the financial data for the years (2019-2022) in obtaining information. The research reached a set of results, the most prominent of which was
... Show More