Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to save much more details of the cover image and avoid any doubts that there is any secret information are hidden inside it. The quality of the stego-image and the extracted audio files are evaluated with the standard evaluation metric. The simulation results shown significant results of these metrics and achieve good imperceptibility and high security of the stego-image. The SNR and SPCC values are considered acceptance that means significant in terms quality and similarity of the reconstructed signal.
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreIn the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show MoreDespite the G protein-coupled receptors (GPCRs) being the largest family of signalling proteins at the surface of cells, their potential to be targeted in cancer therapy is still under-utilised. This review highlights the contribution of these receptors to the process of oncogenesis and points to some likely challenges that might be encountered in targeting them. GPCR-signalling pathways are often complex and can be tissue-specific. Cancer cells hijack these communication networks to their proliferative advantage. The role of selected GPCRs in the different hallmarks of cancer is examined to highlight the complexity of targeting these receptors for therapeutic benefit. Our
... Show MoreThe work in this paper focuses on the system quality of direct and coherent communication system for two computers. A system quality is represented by Signal to Noise ratio (SNR) and Bit Error Rate (BER). First part of the work includes implementation of direct optical fiber communication system and measure the system quality .The second part of the work include implementation both the( homodyne and heterodyne)coherent optical fiber communication system and measure the system quality . Laser diode 1310 nm wavelength with its drive circuit used in the transmitter circuit . A single mode of 62.11 km optical fiber is selected as transmission medium . A PIN photo detector is used in the receiver circuit. The optical D-coupler was u
... Show MoreThis work represents implementation and investigation of optical coherent communication system between two computers. A single mode optical fiber is selected as transmission medium. The data are sent via the RS-232 standard interface with a bit rate of 9.6 kbps from personal computer (PC1) by line receive to convert the data from electrical levels (-12/+12 V) into TTL level (0/5 V). The modulation of this data was accomplished by internal modulation using laser diode type (HFCT-5208M) 1310 nm wavelength. The optical D-coupler was used to combine the optical signal that come from laser source with optical signal of laser local oscillator (OTS-304XI) at 1310/1550 nm wavelength to obtain coherent (homodyne and heterodyne) detection respective
... Show Moreirrigation use at many stations along the Euphrates River inside the Iraqi lands and to try to correlate the results with the satellite image analyses for the purpose of making a colored model for the Euphrates that can be used to predict the quality classifications of the river for irrigation use at any point along the river. The Bhargava method was used to calculate the water quality index for irrigation use at sixteen stations along the river from its entrance to the Iraqi land at Al-Qaim in Anbar governorate to its union with the Tigris River at Qurna in Basrah governorate. Coordinates of the sixteen stations of the Euphrates River were projected at the mosaic of Iraq satellite image which was taken from LANDSAT satellite for bands 1, 2
... Show MoreAbstract
The research aims to determine the nature of the Iraqi market in terms of banking financial stability and the extent impact of the operational efficiency on it, Accordingly, chosen 15 relational banks were chosen as an intentional sample that could represent the Iraqi banking system for the period 2010-2020. The operational efficiency variable was measured according to the data envelope model, and banking financial stability used CAMELS model which includes five indicators (capital adequacy, asset quality, management quality, profitability, and liquidity), so for testing the research hypotheses used the random regression model by adopting the S
... Show MorePolitical Discourse Analysis is an important linguistic study approach used by politicians to gain people support. The present paper sheds light on the figures of speech of emphasis in the televised debate between the two presidential elections candidates, Emmanuel Macron and Marine Le Pen and the distinctive effect they add to the political discourse to win general public support as well as the presidential elections.
The present paper provides a rudimentary definition and an analysis of the terms “discourse” and “political discourse” and traces the significant role played by politically directed televised Media and internet to support political pa
... Show More