With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreIn this work, we construct projectively distinct (k,3)-arcs in the projective plane PG(2,9) by applying a geometrical method. The cubic curves have been been constructed by using the general equation of the cubic. We found that there are complete (13,3)-arcs, complete (15,3)-arcs and we found that the only (16,3)-arcs lead to maximum completeness
The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art
... Show MoreIn this paper, membrane-based computing image segmentation, both region-based and edge-based, is proposed for medical images that involve two types of neighborhood relations between pixels. These neighborhood relations—namely, 4-adjacency and 8-adjacency of a membrane computing approach—construct a family of tissue-like P systems for segmenting actual 2D medical images in a constant number of steps; the two types of adjacency were compared using different hardware platforms. The process involves the generation of membrane-based segmentation rules for 2D medical images. The rules are written in the P-Lingua format and appended to the input image for visualization. The findings show that the neighborhood relations between pixels o
... Show MoreThe world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.
ABSTRACT University college libraries are one of the most important information institutions for all researchers during their research and study life, they seeks to provide information sources such as; books, periodicals, theses, databases, Inquiry service and answering questions services in various disciplines to achieve its goals. In 2020, college libraries of all types stepped up to meet the needs of their users' as they responded to the impacts of COVID-19, also extended necessary lifelines to community members facing job losses, healthcare crises, and remote work and learning during an unprecedented and uncertain time. The research aim to identifying the services provided to the postgraduate students users at University of Baghdad coll
... Show MoreBackground: Asthma is one of the most common chronic respiratory diseases in the world, standing for the most frequent cause for hospitalization and emergency cases. Respiratory viruses are the most triggering cause. Aim: To assess the role of viral infections, especially COVID-19, in the pathogenesis of asthma initiation and exacerbations. Method: Electronic search was done for the manuscripts focusing on asthma as a risk factor for complications after COVID-19 infection. The outcomes were titles, materials, methods and classified studies related or not related to the review study. Three hundred publications were identified and only ten studies were selected for analysis. Seven studies were review, one retrospective, one longitudin
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show More