The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an investigation of information security techniques in medical imaging, focusing on security goals. Encrypting a message before hiding them gives an extra layer of security, and thus, will provide an excellent solution to protect the sensitive information of patients during the sharing of medical information. Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly used to store and transmit medical images. The main objective of this study is to provide a general idea of what Least Significant Bit-based (LSB) steganography techniques have achieved in medical images.
This work includes the synthesis and identification of ligand {3-((4-acetylphenyl)amino)-5,5-dimethylcyclohex2-en-1-one} (HL* ) by the treatment of 5,5-dimethylcyclohexane-1,3-dione with 4-aminoacetophenone under reflux. The ligand (HL* ) was identified via FTIR, Mass spectrum, elemental analysis (C.H.N.), 1H and 13C-NMR spectra, UV-Vis spectroscopy, TGA and melting point. The complexes were synthesized from ligand (HL* ) mixed with 3-aminophenol (A) and metal ion M(II), where M(II) = (Mn, Co, Ni, Cu, Zn and Cd) at alkaline medium to produce complexes of general formula [M(L* )(A)] with (1:1:1) molar ratio. These complexes were detected via FT-IR spectra, UV-Vis spectroscopy as well as elemental analysis (A.A) and melting point, conductivit
... Show MoreThis research sheds light on the morphological structure of nouns and verbs in the novel "ASTONISHMENT" by the novelist Aharon Applefield by analysing selected models from the novel in a morphological analysis in order to identify the most important morphological features of this structure according to a statistical analytical approach.
The morphological structure is the main pillar of the linguistic structure of the literary text. Morphology is the science that studies the word, by which its structure and original letters are known, and the change that has occurred to it. The aesthetics of the fictional text is reflected in this structure, through which the writer conveys his ideas and narrations to the reader. The research
... Show MoreThis study measures the indicators of social and environmental performance of the contents of the administration's prepared reports on its social and environmental performance by comparing the actual performance with the indicators set within the standards of the Global Reports Initiative (GRI), In preparing this research, the researchers relied on studying the criteria of the Global Reporting Initiative, which aims to achieve a high level of performance disclosure under sustainability, In light of contemporary global trends towards achieving sustainable development and its disclosure and the orientations of economic institutions and units in different countries towards emphasizing the extent of commitment during practicing its a
... Show MoreRepresent choices Behaviorism available to the Managerial leaders one of the prerequisites to run any beginnings of a psychological or dilemmas Managerial barriers to working in the field of work has been varied these options until it had taken several kinds of which contributed to the left different impacts on the alleviation of these problems, which prompted the researcher to raising the problem of study within the framework of questionable content how to contribute to that shown by Choices Behaviorism accredited to the Managerial leaders in the management of frustration
... Show MoreMotives: This study examines the integration of Feng Shui principles into urban public spaces to enhance social interaction, livability, and environmental harmony. The case study focuses on the Al-Arabi and Al-Washash neighbourhoods in Baghdad, exploring how spatial characteristics influence engagement and energy circulation (Qi) within the urban network. The motivation arises from deficiencies in connectivity, shading, greenery, and water features, which limit social and aesthetic vibrancy. Aim: The objectives are to evaluate spatial and social dynamics through the Feng Shui Public-Space Index (FS-PSI), Space Syntax analysis, and resident surveys, and to propose strategies using Feng Shui design proxies to improve energy flow, acce
... Show MoreAbstract:
The aim of the present research is to evaluate the child’s nutritional
method (2-5 years old) which is based on his resistance of the food highly rich
with nutritional elements and his acceptance of the food of a low nutritional
value in addition to his having forbidden food with other mates and making
use of all mates when having food, in establishing the sound social values and
affection since child hood. The required statistical equation have been used
by the researcher namely (Z test).
The sample of the present study consists of (26) children who were selected
intentionally and randomly from the kindergartens of Al-Bayaa region and the
college of Education for women. The questionnaires were d
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More
Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the pos
... Show MoreThis work represents implementation and investigation of optical coherent communication system between two computers. A single mode optical fiber is selected as transmission medium. The data are sent via the RS-232 standard interface with a bit rate of 9.6 kbps from personal computer (PC1) by line receive to convert the data from electrical levels (-12/+12 V) into TTL level (0/5 V). The modulation of this data was accomplished by internal modulation using laser diode type (HFCT-5208M) 1310 nm wavelength. The optical D-coupler was used to combine the optical signal that come from laser source with optical signal of laser local oscillator (OTS-304XI) at 1310/1550 nm wavelength to obtain coherent (homodyne and heterodyne) detection respective
... Show MoreDue to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The simulation shows the behavior of optical
... Show More