Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascaded-looking composition of F-functions in a quadrate architecture. The proposed F-function architecture is a three-input, three-output Type-3 AES-Feistel network with additional integer parameters representing the subkeys in use. The suggested system makes use of the AES block cipher as a function on a Type-3 AES-Feistel network. Blocks in the proposed system are 896 bits in length, whereas keys are 128 bits. The production of subkeys is encrypted using a chain of E8- algorithms. The necessary subkeys are then generated with a recursion. The results are reviewed to verify that the new layout improves the security of the AES block cipher when used to encrypt medical images in a computer system.
A numerical study of the double-diffusive laminar natural convection in a right triangular solar collector has been investigated in present work. The base (absorber) and glass cover of the collector are isothermal and isoconcentration surfaces, while the vertical wall is considered adiabatic and impermeable. Both aiding and opposing buoyancy forces have been studied. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. Computer code for MATLAB software has been developed and written to solve mathematical model. Results in the form of streamlines, isotherms, isoconcentration, average Nusselt, and average Sherw
... Show MoreThe tight gas is one of the main types of the unconventional gas. Typically the tight gas reservoirs consist of highly heterogeneous low permeability reservoir. The economic evaluation for the production from tight gas production is very challenging task because of prevailing uncertainties associated with key reservoir properties, such as porosity, permeability as well as drainage boundary. However one of the important parameters requiring in this economic evaluation is the equivalent drainage area of the well, which relates the actual volume of fluids (e.g gas) produced or withdrawn from the reservoir at a certain moment that changes with time. It is difficult to predict this equival
The development of the television industry has led to the emergence of a new type of entertainment program in which producers have abandoned stereotypes in traditional programs, known as (Reality TV show). This type of program has spread rapidly in America, (where there are more than 40 series of these programs), as well as Europe and more than twenty countries around the world, including the Arab countries, where the number of these programs today to about 1000 programs and the number is increasing , Especially with the readiness of the production networks to produce more of these programs for the huge profits they derive from them (because of the high viewing rates and the large number of ads broadcast through them) in return for low prod
... Show MoreVisualization of subsurface geology is mainly considered as the framework of the required structure to provide distribution of petrophysical properties. The geological model helps to understand the behavior of the fluid flow in the porous media that is affected by heterogeneity of the reservoir and helps in calculating the initial oil in place as well as selecting accurate new well location. In this study, a geological model is built for Qaiyarah field, tertiary reservoir, relying on well data from 48 wells, including the location of wells, formation tops and contour map. The structural model is constructed for the tertiary reservoir, which is an asymmetrical anticline consisting of two domes separated by a saddle. It is found that
... Show MoreObjectives: The present study aimed to assess the compulsion among health care providers during the pandemic of COVID-19.
Methodology: a descriptive design was used in the present study. This study was conducted from October 10th, 2020 through May 20th, 2021. The study was conducted on a probability (convenient) sample of 248 physicians and nurses who work at Baghdad Teaching hospital in Baghdad city. The instrument was used in this study is the COVID Stress Scale-Arabic version (CSS).
Results: The result of this study showed that 42 % of HCPs had moderate symptoms and 36% of them had mild compulsive symptoms, and
... Show MoreA total of 96 stool samples were collected from children with bloody diarrhea from two hospitals in Baghdad. All samples were surveyed and examined for the presence of the Escherichia coli O157:H7 and differentiate it from other Non -Sorbitol Fermenting Escherichia coli (NSF E. coli). The Bacterial isolates were identifed by using morphological diagnostic methods, Samples were cultured on liquid enrichment medium, incubated at 37C? for 24 hrs, and then cultured on Cefixime Tellurite -Sorbitol MacConkey Agar (CT- SMAC). 32 non-sorbitol fermenting bacterial isolates were obtained of which 11 were identified as Escherichia coli by using traditional biochemical tests and API20E diagnostic system without differentiation between
... Show MoreBrain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining
... Show MoreThe objective of this work is to investigate the performance of a conventional three phase induction motor supplied by unbalanced voltages. An effort to study the motor steady state performance under this disturbance is introduced. Using per phase equivalent circuit analysis with the concept of symmetrical components approach, the steady state performance is theoretically calculated. Also, a model for the induction motor with the MATLAB/Simulink SPS tools has been implemented and steady state results were obtained. Both results are compared and show good correlation as well. The simulation model is introduced to support and enhance electrical engineers with a complete understanding for the steady state performance of a fully loaded induc
... Show More