Preferred Language
Articles
/
bhcwiJIBVTCNdQwCCLO-
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascaded-looking composition of F-functions in a quadrate architecture. The proposed F-function architecture is a three-input, three-output Type-3 AES-Feistel network with additional integer parameters representing the subkeys in use. The suggested system makes use of the AES block cipher as a function on a Type-3 AES-Feistel network. Blocks in the proposed system are 896 bits in length, whereas keys are 128 bits. The production of subkeys is encrypted using a chain of E8- algorithms. The necessary subkeys are then generated with a recursion. The results are reviewed to verify that the new layout improves the security of the AES block cipher when used to encrypt medical images in a computer system.

Crossref
View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Proposed methods of image recognition depend on the PCA
...Show More Authors

This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 05 2022
Journal Name
5g Impact On Biomedical Engineering
Wireless Techniques and Applications of the Internet of Medical Things
...Show More Authors

View Publication
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A proposed encryption technique of different texts using circular link lists
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The relationship between medical and nursing staffing and its impact on the quality of health service / Applied Research.
...Show More Authors

The research aims to find out the relationship between the medical and nursing staffing and its impact on the quality of provided health service in the Yarmouk Teaching Hospital, and to understand the nature of the relationship between doctors and nurses, it has been the adoption of cooperation and conflict Kmngaran independent knowledge of the relationship between doctors and nurses and the quality of health service as a variable certified by eating five dimensions (tangibility, reliability, safety, responsiveness, empathy). The research was adopted to collect data on the questionnaire prepared medical and nursing to the angel and adopted included Likert Quintet her, and distributed to doctors working in the Yarmouk hospital in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Determination of the Impact of Electronic Health Information Systems upon Medical, Medical Backing and Administrative Decisions in Al-Kindy Teaching Hospital
...Show More Authors

Objective(s): To determine the impact of the electronic Health Information Systems upon medical, medical Backing and administrativedecisions in Al-Kindy Teaching Hospital. Methodology: A descriptive analytical design is employed through the period of June 14th 2015 to August 15th 2015. A purposive "non- probability" sample of (50) subject is selected. The sample is comprised of (25) medical and medical backing staff and (25) administrative staff who are all involved in the process of decision making in Al-Kindy Teaching Hospital. A self-report questionnaire, of (68) item, is adopted and developed for the purpo

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Ecotoxicology And Environmental Safety
The role of environmental trace element toxicants on autism: A medical biogeochemistry perspective
...Show More Authors

View Publication Preview PDF
Crossref (26)
Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
The Influence of Design and Technological Parameters on the MAF Process
...Show More Authors

Abstract

 Experimental work from Magnetic Abrasive Finishing (MAF) tests was carried out design parameters (amplitude, and number of cycle which are formed the shape of electromagnetic pole), and technological parameters (current, cutting speed, working gap, and finishing time) all have an influence on the mechanical properties of the surface layer in MAF process. This research has made to study the effect of design and technological parameters on the surface roughness (Ra), micro hardness (Hv) and material removal (MR) in working zone. A set of experimental tests has been planned using response surface methodology according to Taguchi matrix (36) with three levels and six factors

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
Deep Learning Approach for Oil Pipeline Leakage Detection Using Image-Based Edge Detection Techniques
...Show More Authors

Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are

... Show More
View Publication
Scopus (12)
Crossref (4)
Scopus Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Simple 2D chaotic remapping scheme for securing optical communication networks
...Show More Authors

In this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the  BE

... Show More
View Publication Preview PDF
Crossref (2)
Crossref