The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an investigation of information security techniques in medical imaging, focusing on security goals. Encrypting a message before hiding them gives an extra layer of security, and thus, will provide an excellent solution to protect the sensitive information of patients during the sharing of medical information. Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly used to store and transmit medical images. The main objective of this study is to provide a general idea of what Least Significant Bit-based (LSB) steganography techniques have achieved in medical images.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThe novel severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) caused a pandemic of coronavirus disease 2019 (COVID-19) which represents a global public health crisis. Based on recent published studies, this review discusses current evidence related to the transmission, clinical characteristics, diagnosis, management and prevention of COVID-19. It is hoped that this review article will provide a benefit for the public to well understand and deal with this new virus, and give a reference for future researches.
The paper is concerned with, the behavior of the hydrostatic thrust bearings lubricated with liquid-solid lubricants using Einstein viscosity formula, and taking into account the centrifugal force resulting from high speed. Also studied is the effect of the bearing dimensions on the pressure, flow rate, load capacity, shear stress, power consumption and stiffness.
The theoretical results show an increase in load capacity by (8.3%) in the presence of solid graphite particles with concentration of (16%) by weight as compared with pure oil, with increasing shear stress. .
In general the performance of hydrostatic thrust bearings improve for load carrying capacity, volume flow rate,
... Show MoreReconstruction project management in the cities of Mosul, Anbar, and Tikrit, in Iraq still faces major obstacles that impede the comprehensive performance of these projects. It is thus necessary to improve the arising challenge estimation in the implementation of reconstruction projects and evaluate their components: time, cost, quality, and scope. This study used the Analytical Hierarchy Process (AHP) to prioritize major and minor criteria in the influential causes of challenges and formulate a mathematical model to help decision-makers estimate them. Using the Super Decisions software, the final results indicated that changes in scope reached 40.8%, which is the greatest difficulty, followed by changes in cost at 27.6%, changes in
... Show MoreAs population growth increases the demand for crops increases and their quality improves, and it becomes necessary to find innovative and modern solutions to enhance production. In this context, artificial intelligence plays a pivotal role in developing new technologies to improve crop sorting and increase agricultural yields. The present review discusses the main differences between manual and mechanical potato harvesting, explaining the advantages and disadvantages of each method. Manual harvesting is highlighted as a traditional method that allows for greater precision in handling the crop, but it requires more time and effort. In contrast, mechanical harvesting provides greater efficiency and speed in the process, but it may damage some
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show More