Preferred Language
Articles
/
bhcwiJIBVTCNdQwCCLO-
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascaded-looking composition of F-functions in a quadrate architecture. The proposed F-function architecture is a three-input, three-output Type-3 AES-Feistel network with additional integer parameters representing the subkeys in use. The suggested system makes use of the AES block cipher as a function on a Type-3 AES-Feistel network. Blocks in the proposed system are 896 bits in length, whereas keys are 128 bits. The production of subkeys is encrypted using a chain of E8- algorithms. The necessary subkeys are then generated with a recursion. The results are reviewed to verify that the new layout improves the security of the AES block cipher when used to encrypt medical images in a computer system.

Crossref
View Publication
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
Mechanisms of Employing Secondary Event in Cinematographic Discourse: ماهر مجيد ابراهيم-شروق مالك حسن
...Show More Authors

  The cinematic story depends on many construction techniques that together constitute the story features technically and the secondary events are considered one of these basic techniques that are directly affected by the employment mechanisms inside the cinematic achievement. This subject initiated the two researchers to decide the title of the research: (Mechanisms of Employing Secondary Event in Cinematographic Discourse). The research is divided into an introduction that included the problem details, the aim and defining the terms used. The first section was the act and the event in the cinematic story, which addressed the relation between the act and the event and the nature of the simulation that tries to ascend the human act

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Hydrogen Energy
Modeling of electrocatalytic hydrogen evolution via high voltage alkaline electrolyzer with different nano-electrocatalysts
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
2020 8th Ieee Ras/embs International Conference For Biomedical Robotics And Biomechatronics (biorob)
Estimating Wrist Joint Torque Using Regression Ensemble of Bagged Trees under Multiple Wrist Postures
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jun 03 2022
Journal Name
Military Medical Science Letters
COVID-19 AMONG A SAMPLE OF IRAQI PATIENTS WITH RHEUMATIC DISEASES: A MULTICENTER STUDY
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Dermatology & Dermatologic Surgery
Treatment of cutaneous leishmaniasis by topical 25% podophyllin solution (single, blinded, therapeutic, controlled study)
...Show More Authors

KE Sharquie, AA Noaimi, AG Al-Ghazzi, Journal of Dermatology & Dermatologic Surgery, 2015 - Cited by 19

View Publication
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Tue May 01 2012
Journal Name
Iraqi Journal Of Physics
Studying the optical properties of ( Cr2O3:I ) thin films prepared by spray pyrolysis technique
...Show More Authors

Undoped and Iodine (I)–doped chrome oxide (Cr2O3)thin films have been prepared by chemical spray pyrolysis technique at substrate temperatures(773K) on glass substrate. Absorbance and transmittance spectra have been recorded as a function of wavelength in the range (340-800 nm) in order to study the optical properties such as reflectance, Energy gap of allowed direct transition, extinction coefficient refractive index, and dielectric constant in real and imagery parts all as a function of wavelength. It was found that all the investigated parameters affect by the doping ratios.

View Publication Preview PDF
Publication Date
Sun Mar 01 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of bone density after six months from dental implants placement using Computed Tomography
...Show More Authors

Background: Determination of local bone mineral density (BMD) immediately after implant insertion play an important role in implant success rate, may offer comprehensive description of the bone, and give enough information to the surgeon prior to implant insertion and at follow up status. The aim of the present study is to evaluate the changes of local bone density in the dental implant recipient sites by using computerized tomography. Material and method: The sample consisted of (20) dental implants recipient sites, bone density assessment was done twice, immediately after implants insertion and after six months. Results: The mean HU of the bone around the implant insertion site, immediately after implant placement was 552.28 HU, and inc

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Natural Volatiles & Essential Oils
Therapeutic Effects of Allicin against the Diabetes Mellitus Induced by Streptozotocin in Male Rats
...Show More Authors

This study aimed to see how allicin (45mg/kg BW) affected diabetic Mellitus in male rats (DM). Forty male rats were utilized, and they were split into four groups at random for 42 days. T2 was treated with 45 mg/kg B.W of allicin dissolved in 1 ml of D.W daily and injected with a single dose of sodium citrate buffer (0.5ml Intra-Peritoneal IP), DM was induced in T1 and T2 by injection of a single dose of streptozotocin 50 mg/kg B.W IP, T1 was assigned as a positive control, T3 received 45 mg/kg B.W. of allicin dissolved in 1 ml D.W. every day, and a single dose of sodium citrate buffer was injected (0.5ml IP). When diabetic rats treated with allicin in T2 were compared to diabetic rats in T1, the findings indicated a significant increase (P

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Promising Gains of 5G Networks with Enhancing Energy Efficiency Using Improved Linear Precoding Schemes
...Show More Authors

Scopus (2)
Scopus Crossref