Preferred Language
Articles
/
bsj-6216
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an investigation of information security techniques in medical imaging, focusing on security goals. Encrypting a message before hiding them gives an extra layer of security, and thus, will provide an excellent solution to protect the sensitive information of patients during the sharing of medical information. Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly used to store and transmit medical images. The main objective of this study is to provide a general idea of what Least Significant Bit-based (LSB) steganography techniques have achieved in medical images.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 30 2020
Journal Name
Neuroquantology Journal
The Effect of Re-Use of Lossy JPEG Compression Algorithm on the Quality of Satellite Image
...Show More Authors

In this study, an analysis of re-using the JPEG lossy algorithm on the quality of satellite imagery is presented. The standard JPEG compression algorithm is adopted and applied using Irfan view program, the rang of JPEG quality that used is 50-100.Depending on the calculated satellite image quality variation, the maximum number of the re-use of the JPEG lossy algorithm adopted in this study is 50 times. The image quality degradation to the JPEG quality factor and the number of re-use of the JPEG algorithm to store the satellite image is analyzed.

View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Constructivism Theory in International Relations (Case Study on the War on Terrorism)
...Show More Authors

        The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Notes on Weibull Distribution
...Show More Authors

Weibull Distribution is one of most important distribution and it is mainly used in reliability and in distribution of life time. The study handled two parameter and three-parameter Weibull Distribution in addition to five –parameter Bi-Weibull distribution. The latter being very new and was not mentioned before in many of the previous references. This distribution depends on both the two parameter and the three –parameter Weibull distributions by using the scale parameter (α) and the shape parameter (b) in the first and adding the location parameter (g)to the second and then joining them together to produce a distribution with five parameters.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Notes on Weibull Distribution
...Show More Authors

Weibull Distribution is one of most important distribution and it is mainly used in reliability and in distribution of life time. The study handled two parameter and three-parameter Weibull Distribution in addition to five –parameter Bi-Weibull distribution. The latter being very new and was not mentioned before in many of the previous references. This distribution depends on both the two parameter and the three –parameter Weibull distributions by using the scale parameter (α) and the shape parameter (b) in the first and adding the location parameter (g)to the second and then joining them together to produce a distribution with five parameters.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology
...Show More Authors

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Journal Of Economics And Administrative Sciences
Spatial Quantile Autoregressive Model: A Review
...Show More Authors

This paper is specifically a detailed review of the Spatial Quantile Autoregressive (SARQR) model that refers to the incorporation of quantile regression models into spatial autoregressive models to facilitate an improved analysis of the characteristics of spatially dependent data. The relevance of SARQR is emphasized in most applications, including but not limited to the fields that might need the study of spatial variation and dependencies. In particular, it looks at literature dated from 1971 and 2024 and shows the extent to which SARQR had already been applied previously in other disciplines such as economics, real estate, environmental science, and epidemiology. Accordingly, evidence indicates SARQR has numerous benefits compar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Tue Apr 01 2025
Journal Name
Journal Of Economics And Administrative Sciences
Spatial Quantile Autoregressive Model: A Review
...Show More Authors

This paper is specifically a detailed review of the Spatial Quantile Autoregressive (SARQR) model that refers to the incorporation of quantile regression models into spatial autoregressive models to facilitate an improved analysis of the characteristics of spatially dependent data. The relevance of SARQR is emphasized in most applications, including but not limited to the fields that might need the study of spatial variation and dependencies. In particular, it looks at literature dated from 1971 and 2024 and shows the extent to which SARQR had already been applied previously in other disciplines such as economics, real estate, environmental science, and epidemiology. Accordingly, evidence indicates SARQR has numerous benefits compar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Materials Today: Proceedings
A review of automatic history matching
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref