Preferred Language
Articles
/
bsj-6216
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an investigation of information security techniques in medical imaging, focusing on security goals. Encrypting a message before hiding them gives an extra layer of security, and thus, will provide an excellent solution to protect the sensitive information of patients during the sharing of medical information. Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly used to store and transmit medical images. The main objective of this study is to provide a general idea of what Least Significant Bit-based (LSB) steganography techniques have achieved in medical images.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 15 2020
Journal Name
Al-mustansiriyah Journal Of Science
Adaptation Proposed Methods for Handling Imbalanced Datasets based on Over-Sampling Technique
...Show More Authors

Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE),  Border

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Radioelectronics And Communications Systems
Optical CDMA Coded STBC Based on Chaotic Technique in FSO Communication Systems
...Show More Authors

Free-Space Optical (FSO) can provide high-speed communications when the effect of turbulence is not serious. However, Space-Time-Block-Code (STBC) is a good candidate to mitigate this seriousness. This paper proposes a hybrid of an Optical Code Division Multiple Access (OCDMA) and STBC in FSO communication for last mile solutions, where access to remote areas is complicated. The main weakness effecting a FSO link is the atmospheric turbulence. The feasibility of employing STBC in OCDMA is to mitigate these effects. The current work evaluates the Bit-Error-Rate (BER) performance of OCDMA operating under the scintillation effect, where this effect can be described by the gamma-gamma model. The most obvious finding to emerge from the analysis

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Future of Mathematical Modelling: A Review of COVID-19 Infected Cases Using S-I-R Model
...Show More Authors

The spread of novel coronavirus disease (COVID-19) has resulted in chaos around the globe. The infected cases are still increasing, with many countries still showing a trend of growing daily cases. To forecast the trend of active cases, a mathematical model, namely the SIR model was used, to visualize the spread of COVID-19. For this article, the forecast of the spread of the virus in Malaysia has been made, assuming that all Malaysian will eventually be susceptible. With no vaccine and antiviral drug currently developed, the visualization of how the peak of infection (namely flattening the curve) can be reduced to minimize the effect of COVID-19 disease. For Malaysians, let’s ensure to follow the rules and obey the SOP to lower the

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Applying A* Path Planning Algorithm Based on Modified C-Space Analysis
...Show More Authors

In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the Six Sigma technique in a solutionProblems of work (analytical study)
...Show More Authors

The research Concentrates on modern Variable in the organizations that is 6 sigma. The field study is two of Iraqi industrial organizations, The first is state company of …………… , the other is the state company of ……

The problem of the research determines some questions and hypotheses, The data was Collected by question air, which contains 5 dimensions and (10) critical Successful factories  . 

The sample contains (42) who Works in that organizations. The points out many conclusions. The main of it, there is significant differences among the two organizations Then The research concluded with a number of important recommendations serve it's objectives .

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Reality and Challenges of Digital Marketing: An Empirical Study on Teaching Staff at Jouf University
...Show More Authors

Given the growing interest in digital marketing operations and the technology imposed by the reality in which both companies and their customers are affected, the researchers attempted to shed light on the reality and challenges of digital marketing from the faculty members viewpoint at Jouf university, the problem is that technology has imposed a new reality that has resulted in a major change in behavioral patterns of customers with a number of obstacles and challenges confronted customers in digital marketing, it is expected that the outcomes of this study help companies in overcoming the obstacles that prevent the desire and ability of the customer to change his behavioral style to deal with electronic shopping operations and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Legal Sciences
Compensation those affected by technological development risks within the scope of medical works
...Show More Authors

those affected by technological development risks within the scope of medical works. The unprecedented technological development the world witnesses nowadays has been providing brilliant medical service to the human being including examination, diagnosis and the treatment or follow up. However, such works hide behind potential risks threatening people's lives and such risks my be discovered within the limits of now – how and technical knowledge prevailing the time of rendering the medical service. Also this the question is raised on how to keep up between the safety of the patients and such risks are being unknown by the provider and questioning them contradicts the justices. subsequently, can the patients (affected) acquire the compensat

... Show More
View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Influence of Cold Plasma on Sesame Paste and the Nano Sesame Paste Based on Co-occurrence Matrix
...Show More Authors

The aim of the research is to investigate the effect of cold plasma on the bacteria grown on texture of sesame paste in its normal particle and nano particle size. Starting by using the image segmentation process depending on the threshold method, it is used to get rid of the reflection of the glass slides on which the sesame samples are placed.  The classification process implemented to separate the sesame paste texture from normal and abnormal texture. The abnormal texture appears when the bacteria has been grown on the sesame paste after being left for two days in the air, unsupervised k-mean classification process used to classify the infected region, the normal region and the treated region. The bacteria treated with cold plasma, t

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Using Fuzzy Clustering to Detect the Tumor Area in Stomach Medical Images
...Show More Authors

Although the number of stomach tumor patients reduced obviously during last decades in western countries, but this illness is still one of the main causes of death in developing countries. The aim of this research is to detect the area of a tumor in a stomach images based on fuzzy clustering. The proposed methodology consists of three stages. The stomach images are divided into four quarters and then features elicited from each quarter in the first stage by utilizing seven moments invariant. Fuzzy C-Mean clustering (FCM) was employed in the second stage for each quarter to collect the features of each quarter into clusters. Manhattan distance was calculated in the third stage among all clusters' centers in all quarters to disclosure of t

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref