A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s unique mark is used later as a watermark to be embedded into host PMI using blind watermarking-based singular value decomposition (SVD) algorithm. This is a new solution that we also proposed to applying SVD into a blind watermarking image. Our algorithm preserves PMI content authentication during the transmission and PMR ownership to the patient for subsequently transmitting associated diagnosis to the correct patient via a mobile telemedicine application. The performance of experimental results is high compare to previous results, uses recovered watermarks demonstrating promising results in the tamper detection metrics and self-recovery capability, with 30db PSNR, NC value is 0.99.
ABSTRACT : This research involves the synthesis of five to seven heterocyclic compounds starting with Schiff’s bases which derived from oxime as a starting material. 1.3-oxazepine derivatives were prepared from adding different anhydrides to the Schiff bases, tetrazole and thiazolidinone derivatives synthesized from add sodium azide and thioglycolic acid to the same Schiff’s bases as a five members ring. Pyrimidine derivatives were prepared after the reaction of the azomethine group with acetyl chloride and then urea and thiourea to synthesis on derivatives contain the six members ring. Another step included identified and confirmed these compounds by FT- IR, 1HNMR, TLC and 13CNMR finally, step included the assay of biological activity
... Show MoreThe studies on unbonded post-tensioned concrete members strengthened with Carbon Fiber Reinforced Polymers (CFRPs) are limited and the effect of strengthening on the strain of unbonded pre-stressed steel is not well characterized. Estimating the flexural capacity of unbound post-tensioned members using the design methodology specified in the design guidelines for FRP strengthening techniques of bonded post-tensioned members does not provide a reliable evaluation. This study investigates the behavior of unbonded post-tensioned concrete members with partial strand damage (14.3% and 28.6% damage) and strengthened with CFRP laminates using a near-surface mounted technique with and without U-wrap anchorages. The experimental results show
... Show MoreAllosteric inhibition of EGFR tyrosine kinase (TK) is currently among the most attractive approaches for designing and developing anti-cancer drugs to avoid chemoresistance exhibited by clinically approved ATP-competitive inhibitors. The current work aimed to synthesize new biphenyl-containing derivatives that were predicted to act as EGFR TK allosteric site inhibitors based on molecular docking studies.
A new series of 4'-hydroxybiphenyl-4-carboxylic acid derivatives, including hydrazine-1-carbothioamide (S3-S6) and 1,2,4-triazole (S7-S10) derivatives, were synthesized and characterized using IR, 1HNMR, 13CNMR
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Abstract
This study turns about The Military Thinking and His Islamic balance in
The Caliph Ali Bin Abi Talib ( peace is on him ) Compact to Malek Al Ashtar
(God be pleased on him )The military field is very wide in all intellectual and
practically effects at The Caliph Ali Bin Abi Taleb(peace is on him ). Its
considered the first seed for islam ,therefore,there are a lot from military
situtions which proved his practical experience in these affairs , and away
from the details of war and practical battles lets search the sample and the
academic study for fair military thinking (justice) in The Compact of Caliph Ali
to Malek Al Ashtar when he became the ruler of egypt.
The military fair thinking determines fr
Naturally available products have been used widely for centuries in handling human disease. The present study aimed to determine the effect of aluminum potassium sulfate addition into the soft liner on tensile strength and peel bond strength. The effect of aluminum potassium sulfate evaluated by two methods, first one include incorporation of KAL (SO4)2 into soft liner monomer in concentration (2%,3% by wt.) while the second method include immersion of soft liner specimens in solution of KAL(SO4)2 in concentration(5%,10% percent) during time periods (0,10 minutes). In conclusions, the results of current study encourage use KAL (SO4)2 within soft liner material
Las formas verbales: el infinitivo, el gerundio y el participio, son derivados verbales que se comportan como sustantivos, adverbios o adjetivos, respectivamente; aunque, dado su carácter verbal pueden también funcionar como verbos y, por tanto, como núcleos del predicado.
El presente trabajo presenta una visión general sobre las formas no personales del verbo en español. Se debe recordar que las formas no personales del verbo tiene funciones y valores dentro de la oración.
Este trabajo lo dividimos en dos partes: la primera presenta un breve marco teórico en que se explica las formas no personales del verbo y como se forman además de sus funciones.
Abstract
... Show MoreBackground: Oral health represents an important base for human well-being; the heath of the body begins from oral cavity. Great deal has been applied to increase knowledge in the field of oral health in order to develop appropriate preventive program. This study was conducted in order to estimate the percentage and severity of dental caries and gingivitis among children attending Preventive Department in Collage of Dentistry, University of Baghdad and to determine dental treatment need for those patients, further more to study the relation of these variables with dental knowledge. Materials and Methods: The study group consists of 163 children with an age ranged from 6 to 14 years, who attended the preventive clinic for the first time to be
... Show MoreCompound 4-(((6-amino-7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (6) was synthesized by multi steps. The corresponding acetonitrile thioalkyl (7) was cyclized by refluxing with acetic acid to afford 4-(((6-amino-7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (8). Two new series of 4-(((6-(3-(4-aryl) thioureido)-7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (9a-c) and of 4-(((6-(substitutedbenzamido) 7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (10a-c) were synthesized as new derivatives for fused 1, 2, 4-trizaole-thiadiazine (8). The antioxidant
... Show MoreThe article considers semantic and stylistic motivations for using obsolete lexicon (historicisms) in the text of a work of art. The specifics of the functioning of this process are presented against the background of the features of the contemporary Russian literary language. Attention is focused on the fact that the layer of obsolete lexical units belongs to a number of nationally specific vocabulary, the development of which forms an understanding of the nature of the actualized language. In addition, it should be noted that the semantics of historicisms is culturally commensurate: the latter is explained by the fact that the deactuation of linguistic units is positioned as parallel to the sociocultural and political changes.
... Show More