The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an investigation of information security techniques in medical imaging, focusing on security goals. Encrypting a message before hiding them gives an extra layer of security, and thus, will provide an excellent solution to protect the sensitive information of patients during the sharing of medical information. Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly used to store and transmit medical images. The main objective of this study is to provide a general idea of what Least Significant Bit-based (LSB) steganography techniques have achieved in medical images.
In recent years, the attention of researchers, governments and international non-governmental organizations has focused on the aggressive practices adopted by companies with the aim of evading the tax burden or from paying the tax obligations imposed on them by law, as the results of these practices are negatively affected by tax revenues. And that companies are part of the society in which they work, and they have rights and obligations, including paying taxes. The research community is the Iraqi private shareholding companies, and the research sample was 4 companies within the private sector and in the field and finance - banking, insurance, industrial and service, which are Ashur Bank, Al-Ahlia Insurance Company, Baghdad Soft
... Show MoreThere are two ways that the contract might be formed with (contracting between persons who are attended and contracting between absence persons).the need for determining the precise moment of the contract , is so clear because there is a specify period separate between the declaration of acceptance and the knowledge with it .and it is clear from the four theories known for jurisprudence (theory of the declaration of the acceptance, theory of exporting the acceptance , theory of the arrival of the acceptance , theory of the knowledge with the acceptance ) . It is difficult to promote one theory on another one if we look at each one and the justification of its supporters and what the opponents of each theory expose. Legal background and diff
... Show MoreIt was recorded that Terpinen-4-ol has an anti-parasitic properties, so it will be noteworthy to intensify the studies about this compound.
This study aims to test the effectiveness of terpinen-4-ol on amastigote forms of Leishmania parasite in macrophages.
This effect was studied by adding increasing concentrations of Terpinen-4-ol to culture wells containing mouse macrophages that were previously incubated with the promastigote forms of the parasites for 24 hours .Then, they were incubated for another 24 hours with increasing concentrations of Terpinen-4-ol. After, Parasites were enumerated into macrophages in wells either treated with Terpinen-4-ol or in control wells.
Treatment with Ter
... Show MoreBackground: The aim of this study was to evaluate the shear bond strength (SBS) and adhesive remnant index (ARI) of different orthodontic adhesive systems after exposure to aging media (water storage and acid challenge). Materials and methods: Eighty human upper premolar teeth were extracted for orthodontic purposes and randomly divided into two groups (40 teeth each): the first group in which the bonded teeth were stored in distilled water for 30 days at 37°C, and the second group in which the bonded teeth were subjected to acid challenge. Each group was further subdivided into four subgroups (10 teeth each) according to the type of adhesive system that would be bonded to metal brackets: either non-fluoride releasing adhesive (NFRA),
... Show MoreThe Evolution Of Information Technology And The Use Of Computer Systems Led To Increase Attention To The Use Of Modern Techniques In The Auditing Process , As It Will Overcome Some Of The Human Shortcomings In The Exercise Of Professional Judgment, Then It Can Improve The Efficiency And Effectiveness Of The Audit Process, Where The New Audit Methodologies Espouse The Concept Of Risk Which Includes Strategic Dimension With Regard To The Capacity Of The Entity To Achieve Its Goals, Which Requires Auditors To Rely On Advanced Technology That Can Identify The Factors Which Prevent The Entity From Achieving Its Objectives. The Idea Of Research Is To Preparing An Electronic Program Fer All Audit Work From Planning Through Sampling And Document
... Show MoreABSTRACT Background: Color changes that are detectable to human eye can affect the esthetic appearance of ceramic veneers. The purpose of this study was to evaluate and compare the effect of artificial accelerated aging on the color of ceramic veneers cemented with different resin cements. Materials and Methods: Sixty discs were prepared with 0.5 mm thickness, 30 discs made from IPS e.max press (Ivoclar Vivadent) and 30 discs were made from VITA Enamic (VITA Zahnfabrik). The discs were cemented with three resin cements: Variolink Veneer MV 0 shade (Ivoclar Vivadent), Rely X veneer Translucent shade (3M ESPE) and NX3 Nexus Clear shade (Kerr Corporation) with 0.1 mm thickness. The spectrophotometer Easyshade Advance was used to measure the co
... Show MoreRuthenium-Ruthenium and Ruthenium–ligand interactions in the triruthenium "[Ru3(μ-H)(μ3-κ2-Hamphox-N,N)(CO)9]" cluster are studied at DFT level of theory. The topological indices are evaluated in term of QTAIM (quantum theory of atoms in molecule). The computed topological parameters are in agreement with related transition metal complexes documented in the research papers. The QTAIM analysis of the bridged core part, i.e., Ru3H, analysis shows that there is no bond path and bond critical point (chemical bonding) between Ru(2) and Ru(3). Nevertheless, a non-negligible delocalization index for this non-bonding interaction is calculated
... Show MoreThe existing investigation explains the consequence of irradiation of violet laser on the structure properties of MawsoniteCu6Fe2SnS8 [CFTS] thin films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser. when the received films were processed by continuous red laser (700 nm) with power (>1000mW) for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time (0,30,45,60,75,90 min) respectively at room temperature.. The XRD diffraction gave polycrysta
... Show More