Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in the slices with the highest saturation for embedding a secret message in the NROI because the ROI contains the information of the ill, so it cannot be modified. The evaluation of the proposed method using PSNR and MSE shows good results according to both requirements of the watermark system, the invisibility and quality of the watermarked medical image where the PSNR value is up to 43.3936 and MSE is up to 0.000041.
A general mathematical model for a fixed bed immobilized enzyme reactor was developed to simulate the process of diffusion and reaction inside the biocatalyst particle. The modeling and simulation of starch hydrolysis using immobilized
Mechanism of Arbitration in the Stock Exchange Disputes
Investment Bases directly and closely to an environment characterized by political, social and economic stability, and through a range of policies and institutions and economic laws that affect investor confidence and convince him directing investments to country without the other, where inter conditions and circumstances affecting the trends of capital and settle in, and political situation of the country and what is characterized of stability or disorder as well as economic conditions that are affected by what is distinguishes the country from geographic and demographic characteristics are reflected on availability of production elements and country's infrastructure.
... Show MoreA cinematic shot is the basis of the film, regardless of the size, angle, or motion of this shot. However, the size of the footage and the process of showing or hiding the scene or cinematic personality has a certain speciality related to the nature of cinematic treatment and the type of the movie especially those characterized by the employment of the close-ups to induce ambiguity or spread the mental image of the dramatic events and this relationship between the close-up and horror films is what prompted the researcher to identify the title of the search as follows:
Dramatic utilization of Close-Up in Horror Movies
The research is divided as follows:
The methodological fram
... Show Moreحضيت القيادة باهتمام كبير من قبل الباحثين ودورها الإيجابي في التأثير على الموظفين ونجاح المنظمات، في الآونة الأخير بدأت الدراسات تركز على الجانب المظلم للقيادة وتأثيرها على التابعين وبيئة العمل، وقد تم تحديد القيادة السامة بأنها أخطر الأساليب القيادية التي تتسبب بتكاليف مادية ومعنوية على المنظمات بمختلف جوانبها، ان القيادة السامة تأثر على دوافع المرؤوسين وقدرتهم على انجاز المهام، ورغبتهم في الاستمرار في
... Show MoreQJ Rashid, IH Abdul-Abbas, MR Younus, PalArch's Journal of Archaeology of Egypt/Egyptology, 2021 - Cited by 4
Many trials were made to prepare Tinidazole 2% as bioadhesive vaginal gels using different gel bases including hydroxypropyl methyl cellulose (3 and 4% w/w), methylcellulose (3 and 4%w/w) and carboxymethylcellulose (2 and 3% w/w) .Swelling index of the polymers,pH , viscosity , bioadhesive force , and in-vitro drug release to the simulating vaginal fluid (S.V.F.) were investigated for all the prepared bioadhesive gels . The mechanism of drug release from the gel bases was also investigated.
The results revealed that C MC 3% gave the highest viscosity and bioadhesive strength with the lowest release rate while lowest viscosity and bioadhesive force
... Show MoreIn the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreEducation is the most powerful and important weapon in fighting poverty and unemployment because it provides students with new skills that appropriate the new market requirements and fair distribution of natural resources. It also transfers knowledge, skills, and ethics over generations. Education aims to create effective leaders who go under training and rehabilitation process, create a new human and instill faith, generate the creativity and innovation, and keep abreast with scientific process, updating curriculum, and finally, applying the technical education