Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
The researchers of the present study have conducted a genre analysis of two political debates between American presidential nominees in the 2016 and 2020 elections. The current study seeks to analyze the cognitive construction of political debates to evaluate the typical moves and strategies politicians use to express their communicative intentions and to reveal the language manifestations of those moves and strategies. To achieve the study’s aims, the researchers adopt Bhatia’s (1993) framework of cognitive construction supported by van Emeren’s (2010) pragma-dialectic framework. The study demonstrates that both presidents adhere to this genre structuring to further their political agendas. For a positive and promising image
... Show MoreThis research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions:
- Is it possible to examine praise poetry as a tagmeme?
- Is this analysis of great help in teaching English and Arabic to students in the College of Education?
The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9.
&nbs
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreIn this study, a predicated formula is been proposed to find the shear strength of non-prismatic beams with or without openings. It depends on the contributions of concrete shear strength considering the beam depth variation and existing openings, shear steel reinforcements and defines the critical shear section, the effect of diagonal shear reinforcement, the effect of inclined tensile steel reinforcement, and the compression chord influence. The verification of the proposed formula has been conducted on the experimental test results of 26 non-prismatic beams with or without openings at the same loading conditions. The results reflect that the predicted formula finds the shear capacity of non-prismatic beams with openings, it is co
... Show MoreArrested precipitation methode used to synthesize CuInSe2 (CIS) nanocrystals were added to a hot solvent with organic capping ligands to control nanocrystal formation and growth. CIS thin films deposited onto Soda-Lima Glass (SLG) substrate by spray-coat, then selenized in Ar-atmosphere to form CIS thin films. PVs were made with power conversion efficiencies of 0.631% as-deposited and 0.846% after selenization, for Mo coated, under AM 1.5 illuminations. (XRD) and (EDX) it is evident that CIS have chalcopyrite structure as the major phase with a preferred orientation along (112) direction and Cu:In:Se nanocrystals is nearly 1:1:2 atomic ratio.
This review covers recent progress in the synthesis of curcumin and the bioactivity of semisynthetic and synthetic analogs of curcumin. The review also shows how curcumin is a useful intermediate for the synthesis of more complex organic molecules; historical perspective; the process of preparing the metal complexes and characterization the produced complexes using various spectral and other techniques; shows the importance of curcumin and its derivatives for their potential applications in medical devices and broad-spectrum of medical application such as antibiotic ointment, alternative therapeutics, antifungal, and antibacterial activities