Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in the slices with the highest saturation for embedding a secret message in the NROI because the ROI contains the information of the ill, so it cannot be modified. The evaluation of the proposed method using PSNR and MSE shows good results according to both requirements of the watermark system, the invisibility and quality of the watermarked medical image where the PSNR value is up to 43.3936 and MSE is up to 0.000041.
This research considers the preservation of environment through recycling old toys. This is achieved by transforming the old toys into educational clothing accessories for kindergarten stages. The research methodology adapts both descriptive and applied approaches. The research questionnaire targeted a sample of 35 teachers to collect information about the waste toys in kindergarten. Also, another sample of 30 teachers and mothers were targeted to measure the suitability of the clothing designs for the early childhood stages. The results shows that both teachers and mothers were well satisfied with clothing accessories designed with the toys waste. This concept contributes to limiting the pollution caused by toys and could save time, eff
... Show MoreThis study is conducted to verify the efficienecy of local Ninivite rock when used in the treatment of drinking water in plants operating currently in the country in order to develop the situation of these stations to cope with the increase in population. Also, this will limit the pollutian which are increasing in the country's rivers.
(Euphrates and Tigris). These rivers are the sources to feed all water treatment plants in the country. The idea is the develop or the modify these stations by replacing part of top layer of sand filters used in these stations with Ninivite rock to operate as filters composed of two medium. The efficiency of this rock is compared with other materials used successfully worldwide in this area, such a
... Show MoreBackground: Rhinosinusitis is an inflammatory disorder that refers to inflammation of the nose and paranasal sinuses. Recent studies show that serum IL-33, periostin, ARGE and sST2 had the role in the pathogenesis of chronic rhinosinusitis as an easy, non-invasive and readily available (biomarker) for diagnosis of chronic rhinosinusitis. We tested for correlations of IL-33, periostin, ARGE and sST2 between acute and chronic rhinosinusitis in compare to healthy people. This study aimed to Measure serum levels of periostin, IL-33, sST2, and ARGE biomarkers in patients ARS and CRS. Materials and Methods: We collected serum of 30 patients with acute rhinosinusitis, 30 with chronic rhinosinusitis, and 30 controls to examine serum levels of IL-3
... Show MoreThe main aim of the current research is to focus the light on some bacterial contamination on cracked eggshell and egg content plus studying the sensitivity of these bacterial isolates to antibiotics. For this purpose, a total of 50 eggs were collected from the markets in Baghdad city (Iraq) and examined for bacterial isolation from cracked eggshells and from the egg contents. The bacterial isolates were cultured and purified then transferred to a specific media to study its sensitivity against antibiotics. The results revealed that bacteria isolated from both cracked eggshells (46%) and egg contents (44%). The bacteria isolated include E. coli, Staphylococcus, Enterococcus faecalis, Enterobacter and Pseudomonas. The results of antibiotic s
... Show MoreThis in vivo study was conducted to investigate the effect of different concentrations of ozonated water on experimentally skin infection with some of bacterial isolates (Pseudomonas aeruginosa and Staphylococcus aureus ) which Showed dermal infection in experimental animals after 48 hours of exposure to these Microorganisms. Results revealed that ozone has the power to accelerated the healing process depending on the perfect concentration of ozonated water used and the severity of infection & nature of causative agent , in which the recovering period was 7 days for the infection caused by P. aeruginosa and 5 day for S.aureus by using the concentration 60 µg/ml . Results also indicated in this study the stimulated effect of O
... Show MoreThis research investigates the impact of varying concentrations of silver oxide on the structure and morphology of phosphate bioactive glass (PBG). PBGs are gaining popularity as a potential replacement for traditional silicate glasses in biomedical applications due to their adjustable chemical resistance and exceptional bioactivity. Upon examination of the scanning electron microscope of the composites without Ag2O, it was observed that the grains tended to merge together, and the surface particles appeared to be larger than those in composites with Ag2O at concentrations of 0.25, 0.5, and 0.75 wt%. The study found that the diffraction pattern of phosphate bioactive glass composites sintered without Ag2O showed the presence of Stro
... Show MoreThe formal diversity in designs is achieved by creating shapes and lines with a distinct movement pattern, which are preceded by mental processes. The greatest source of diversity in design in general and industrial design in particular is the creation of multiple directions for the completion of designs and the diversification of intellectual proposals for the design idea. The human activity that takes place around us in various fields of life takes place due to the diversity of movement in the form of the design product and its effectiveness through the dynamic diversity in the form, which differs in the methods of designing and showing it. He invents material value as a distinct artistic product that he owns A specific form or system
... Show MoreSorting and grading agricultural crops using manual sorting is a cumbersome and arduous process, in addition to the high costs and increased labor, as well as the low quality of sorting and grading compared to automatic sorting. the importance of deep learning, which includes the artificial neural network in prediction, also shows the importance of automated sorting in terms of efficiency, quality, and accuracy of sorting and grading. artificial neural network in predicting values and choosing what is good and suitable for agricultural crops, especially local lemons.
To determine the seroprevalence of hepatitis B markers in chronic hepatitis B patients, 75 patients with chronic hepatitis B virus of ages (8-70) years have been investigated and compared with 50 apparently healthy individuals. All the studied groups were carried out to measure (HBsAg), (HBsAb), (HBeAg), (HBeAb), and (Total HBcAb) by Enzyme linked immunosorbent assay (ELISA) technique. The percentage distribution of HBsAg was (86.67%) and HBsAb was (1.33%) in sera of CHB patients and there were a highly significant differences (P<0.01) when compared between studied groups, while, the percentage distribution of HBeAg was (22.67%) in sera of CHB patients and the significant represent the difference in distribution of HBeAg as infection but no
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More