The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an investigation of information security techniques in medical imaging, focusing on security goals. Encrypting a message before hiding them gives an extra layer of security, and thus, will provide an excellent solution to protect the sensitive information of patients during the sharing of medical information. Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly used to store and transmit medical images. The main objective of this study is to provide a general idea of what Least Significant Bit-based (LSB) steganography techniques have achieved in medical images.
The influence of process speed (PS) and tillage depth (TD) , on growth of corn (Zea mays L) yield, for Maha cultivar, were tested at two ranges of PS of 2.483 and 4.011 km.hr-1, and three ranges of TD of 15,20 and 25cm. The experiments were conducted in a factorial experiment under complete randomized design with three replications. The results showed that the PS of 2.483 km.hr-1 was significantly better than the PS of 4.011km.hr-1 in all studied conditions. The , slippage ratio (SR) and the machine efficiency (ME), the physical soil characteristics represented by the soil density and porosity (SBD and TSP), and the plant characteristics represented the roots dry weight, PVI and the crop productivity (CP), except adjective of the fu
... Show MoreIn this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images. So, this study aimed at testing the system performance at poo
... Show MoreThe economy is exceptionally reliant on agricultural productivity. Therefore, in domain of agriculture, plant infection discovery is a vital job because it gives promising advance towards the development of agricultural production. In this work, a framework for potato diseases classification based on feed foreword neural network is proposed. The objective of this work is presenting a system that can detect and classify four kinds of potato tubers diseases; black dot, common scab, potato virus Y and early blight based on their images. The presented PDCNN framework comprises three levels: the pre-processing is first level, which is based on K-means clustering algorithm to detect the infected area from potato image. The s
... Show MoreBlockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show Moreالمقدمة ومنهجية البحث
تعد المحاسبة وليدة الحاجات الاقتصادية وقد بات من الضروري لها أن تتكيف مع التغيرات الحاصلة في بيئة الإعمال من ارتفاع حدة المنافسة، الثورة التكنولوجية للمعلومات والاتصالات، توسع الأسواق المالية، انتشار الشركات المتعددة الجنسيات، العولمة، التوجه نحو حماية البيئة من التلوث وتحمل المسؤولية الاجتماعية والتغيرات في طبيعة المهن لسوق العمل، إذ نجد أن للمحاسبين دورا هاما نحو
... Show MoreThirty swabes of medical implants were collected from Al-Yarmouk's hospital which were cultured on manitole agar to isolate Staphelococcus aureus . Only four samples gave positive results with this media. It was used ten types of antibiotics to test the sensitivity of this bacterium against them. All isolates of S. aureus were recorded as multidrug resistant and were considered as MRSA. One pledge alternative therapy is the utilize of certain pure bacterocin MIC (32.5 to 62.5 μg/ml) and it was compared with vancomycin (200-400 μg/ml) with average of (8 – 15) mm diameter of inhibition zones recpectively. The first reduction of biofilm formation ability has been proved in catheters when treatedby pure bacterocin. The test shows the highes
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreDBN Rashid, Asian Quarterly: An International Journal of Contemporary Issue, 2018