Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa
... Show MoreVisible Light Communication (VLC) has emerged as a powerful technique for wireless communication systems. Providing high data rate and increasing capacity are the major problems in VLC. Recent evidence suggests that Multiple Input Multiple Output (MIMO) technique can offers improved data rates and increased link range. This paper describes the design and implementation of visible light communication system in indoor environment exploring the benefits of MIMO. The specific objective of this research was to implement a 4× 4 Multiple Input (LEDs) Multiple Output (photodetectors)-VLC communication system, where a 16 white power LEDs in four arrays are setting up at transmitter and four RX modules are setting up at receiver side without the nee
... Show MoreBlockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,
... Show MoreWater balance approaches are strategies for resolving key theoretical and practical hydrological issues. The major goals of this study are to examine climatic elements and conditions to calculate groundwater recharge using the water balance approach. The study area is located in Mandaly city, Diyala Governorate, eastern Iraq. The metrological data was gathered between 1994 and 2020 to evaluate the study area's climate. The annual rainfall rate has been 248.61 mm, with a relative humidity of 43.89%, a temperature of 24.41 oC, a wind speed of 1.99 m/sec, sunshine of 8.32 hours per day, and evaporation of (268.09 mm). The total amount of corrected evapotranspiration was 1010.09 mm, with a peak value of 225.29 mm in Jul
... Show MoreBackground: 18F-FDG positron emission tomography (PET) has established itself in the field of oncology and it is useful in the initial staging and follow-up of a variety of malignancies. Significant thyroid uptake is often identified as an accidental finding on whole-body positron emission tomography for non-thyroid disease.
Aim of this study: to investigate the effect of 18F-FDG on thyroid gland function after performing PET scan compared to thyroid function prior to scan.
Materials and Methods: 43 subjects who had an 18F-FDG PET scan as part of a cancer screening program participated in this study. All cancers are diagnosed using 18F-FDG, except for prostate cancer,
... Show MoreStrong and ∆-convergence for a two-step iteration process utilizing asymptotically nonexpansive and total asymptotically nonexpansive noneslf mappings in the CAT(0) spaces have been studied. As well, several strong convergence theorems under semi-compact and condition (M) have been proved. Our results improve and extend numerous familiar results from the existing literature.
Natural Language Processing (NLP) deals with analysing, understanding and generating languages likes human. One of the challenges of NLP is training computers to understand the way of learning and using a language as human. Every training session consists of several types of sentences with different context and linguistic structures. Meaning of a sentence depends on actual meaning of main words with their correct positions. Same word can be used as a noun or adjective or others based on their position. In NLP, Word Embedding is a powerful method which is trained on large collection of texts and encoded general semantic and syntactic information of words. Choosing a right word embedding generates more efficient result than others
... Show MoreCommunity detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a local
... Show More