Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascaded-looking composition of F-functions in a quadrate architecture. The proposed F-function architecture is a three-input, three-output Type-3 AES-Feistel network with additional integer parameters representing the subkeys in use. The suggested system makes use of the AES block cipher as a function on a Type-3 AES-Feistel network. Blocks in the proposed system are 896 bits in length, whereas keys are 128 bits. The production of subkeys is encrypted using a chain of E8- algorithms. The necessary subkeys are then generated with a recursion. The results are reviewed to verify that the new layout improves the security of the AES block cipher when used to encrypt medical images in a computer system.
Each school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,
As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreIn this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreABSTRACT
Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-
... Show MoreThis paper presents L1-adaptive controller for controlling uncertain parameters and time-varying unknown parameters to control the position of a DC servomotor. For the purpose of comparison, the effectiveness of L1-adaptive controller for position control of studied servomotor has been examined and compared with another adaptive controller; Model Reference Adaptive Controller (MRAC). Robustness of both L1-adaptive controller and model reference adaptive controller to different input reference signals and different structures of uncertainty were studied. Three different types of input signals are taken into account; ramp, step and sinusoidal. The L1-adaptive controller ensured uniformly bounded
... Show MoreThis study analyzes how to make use of the resources in the marshlands of Iraq and how to utilize them, especially after the water returns to these areas and they are revitalized. We take an example of AL- Saheen Marsh and plan an ideal tourist resort there. This example can further expand to include other parts of the marshlands. The resort will utilize the local environment and tourist characteristics as it will have a feel and architectural resemblance to the houses and buildings that are currently built there. In addition the transportation methods will be the same as those used by the locals. Yet the resort will still posses all the facilities required by a modern tourist resort that includes all the services that will make
... Show MoreThis study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th
... Show MoreThe research emphasizes importance of preliminary drawings in design of any product. Therefore, using of simulation as tools for visual thinking in developing drawing and design skills. So that practice of drawing by hand, considering shape of ideas in first stage of visualizations, and practice of its techniques and continuous training.
Hence, the research problem arose with the role of simulation method for developing preliminary sketches in the sample of students of the Product Design Department at the College of Design and Art, PNU, as it is important tool for visual thinking that helps the designer in designing and producing innovative artistic works.
Therefore, the research axes, a number of findings and recommendations were
Identify the effect of an educational design according to the repulsive (allosteric) learning model on the achievement of chemistry and lateral thinking. The sample consisted of (59) students from third-grade intermediate students. They were randomly distributed into two groups (experimental and control), and the equivalence was done in (chronological age, previous achievement in chemistry, intelligence, lateral thinking). The (30) students from experimental group were taught according to the instructional design, other 29 students from the (control) group were taught according to the usual method. Two tests done, one of them is an achievement test consisted of (30) items of the type of multiple choice, the other was a lateral think
... Show More