In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox5, the fifth Sbox is formed in GF(28) and it is variable to increase the complexity of the proposed algorithm. The obtained results were tested using many criteria: correlation criteria, number of pixels change rate (NPCR) and mean square error (MSE). These tested factors were approved by the output results which demonstrated that the correlation of image elements in the proposed algorithm was significantly reduced during the encryption operation. Also, the algorithm is very resistant to attempts of breaking the cryptographic key since two keys were used in the encryption/ decryption operations which lead to increase the complexity factor in the proposed algorithm.
Medical image segmentation is a frequent processing step in image medical understanding and computer aided diagnosis. In this paper, development of range operator in image segmentation is proposed depending on dermatology infection. Three different block sizes have been utilized on the range operator and the developed ones to enhance the behavior of the segmentation process of medical images. To exploit the concept of range filtering, the extraction of the texture content of medical image is proposed. Experiment is conducted on different medical images and textures to prove the efficacy of our proposed filter was good results.
Radar is the most eminent device in the prolonged scattering era The mechanisms involve using electromagnetic waves to take Synthetic Aperture Radar (SAR) images for long reaching. The process of setting edges is one of the important processes used in many fields, including radar images, which assists in showing objects such as mobile vehicles, ships, aircraft, and meteorological and terrain forms. In order to accurately identify these objects, their edges must be detected. Many old-style methods are used to isolate the edges but they do not give good results in the determination process. Conservative methods use an operator to detect the edges, such as the Sobel operator which is used to perform edge detection where the edge does
... Show MoreDifferent methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi
... Show MoreBackground: Rheumatoid arthritis (RA) is an autoimmune disorder that involves autoantibodies attacking and weakening joints. RA is characterized by leukocyte (Monocyte, Lymphocyte mast cell .etc) infiltrations into the synovial compartment leading to inflammation in the synovial membrane. Synovitis leads to the release of pro-inflammatory cytokines, matrix metalloproteinases, chemokines, complement proteins, and growth factors. Objective: The current study pointed to verify the diagnostic values of interleukin -17 A and interleukin -18 in Rheumatoid arthritis (RA) patients and the effect of treatment thereon. Study subjects and methods: A total of 88 samples with RA were selected from the health clinics of AL-Yarmouk
... Show MoreBack ground: Fibromyalgia syndrome (FMS) is a common chronic musculo-skeletal disorder resulting in chronic widespread pain impacting on quality life.
Objectives: To assess the relationship between FMS and knee osteoarthritis (KOA) and to evaluate the predictors of this relationship if present.
Patients and Methods: One hundred Iraqi KOA patients and 100 healthy controls were included in this cross-sectional study. Full history was taken and complete clinical examination was done for all patients. Baseline characteristics [age, sex, duration, body mass index (BMI), waist circumference, family history (Hx) of KOA, smoking history, and drug history.] were also documented. Laboratory analysis included complete blood count, erythrocyte
Background: Unstable pelvic ring fractures (PRF) are high energy trauma, commonly associated with systemic and soft tissues elements injures, the external fixation as an emergency and final treatment is one of the options in its management.
Objective: to evaluate the value and role of external fixation for unstable (PRF) and its clinical outcomes.
Patients and methods: twenty one patients with unstable P.R.F have been treated by external fixation , they were 16 men and 5 women ,their average age was 28 years (range ;18-60 years) , two thirds of the cases were due to road traffic accident , 85% were hemodynamicaly unstable , urological and neurological, anorectal injuries were the commonest associate
... Show MoreThe aim of the research was to prepare the fields and items for safe environment scale form professional basketball players and coaches’ point of view. The researchers used the descriptive method on professional athletes of players and coaches from (11) clubs; for the pilot study (21) athletes were selected and for the building sample (103) athletes, and standardization sample (101) athletes from the participants in the Iraqi league (2018-2019). The scale of the safe environment was concluded with (6) fields and (52) items. The researchers came up with the safe environment scale from the point of view of professional basketball players and coaches. Finally the researchers recommended paying attention to providing safe environment for athl
... Show MoreThe present study aims to develop and apply the unrealistic optimism scale among high school students. The researcher has designed a scale of (38) paragraphs to measure the unrealistic optimism. A sample of (200) male and female students were chosen randomly to collect the needed data. The study found that the unrealistic scale of optimism has good psychometric characteristics. The research sample has a high level of التفاؤل غير الواقعي لدى عينة البحث unrealistic optimism. There is a statistically significant difference between male and female in the unrealistic optimism in favor of the male students. Finally, there is a statistically significant difference between students in the fourth and sixth gra
... Show MoreUnder aerobic and anaerobic conditions, two laboratory-scale reactors were operated. Each reactor
was packed with 8.5 kg of shredded synthetic solid waste (less than 5 cm) that was prepared according to an
average composition of domestic solid waste in the city of Kirkuk. Using an air compressor, aerobic
conditions were created in the aerobic reactor. This study shows that the aerobic reactor was more efficient in
COD and BOD5 removal which were 97.88% and 91.25% while in case of anaerobic reactor, they were
66.53%and 19.11%, respectively.
The current research aimed to investigate the psychometric characteristics of the Arabic version of the Nomophobia scale for the Omani youth. The scale was administered to a random sample of students from public and private universities and colleges in Oman. The research sample consisted of 2507 students, of whom 868 males and 1639 females. The validity of the measure was first checked by presenting the scale to a group of experts in this field. Then the exploratory and confirmatory factor analysis was carried out. The exploratory factor analysis revealed the existence of three main factors: the fear of connectivity loss, the fear of communication loss with others, and the fear of network outages. These factors accounted for 65.6% of the
... Show More