Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
AASAH Enass J Waheed, Shatha MH Obaid, Research Journal of Pharmaceutical, Biological and Chemical Sciences, 2019 - Cited by 5
Abstract A descriptive (retrospective) (a case-control) study was carried out at Al-Karama Teaching Hospital, Baghdad Teaching Hospital and Surgical Specialties Hospital, and Gastro-Intestinal Tract and Liver (GIT) Hospital for the period of December 1st, 2001 To March 15th 2002. To identify aspects of life-style that may contribute to the occurrence of peptic ulcer (P.U)as risk factors. And to find out the relationship between the demographic characteristic of the group. Non-probability (Purposive) sample of (100) cases who were admitted to the endoscopy department who were later on diagnosed as having
In this paper, the dynamical behavior of a three-dimensional fractional-order prey-predator model is investigated with Holling type III functional response and constant rate harvesting. It is assumed that the middle predator species consumes only the prey species, and the top predator species consumes only the middle predator species. We also prove the boundedness, the non-negativity, the uniqueness, and the existence of the solutions of the proposed model. Then, all possible equilibria are determined, and the dynamical behaviors of the proposed model around the equilibrium points are investigated. Finally, numerical simulations results are presented to confirm the theoretical results and to give a better understanding of the dynami
... Show MoreKE Sharquie, GA Ibrahim, AA Noaimi, HK Hamudy, J Saudi Soc Dermatol Dermatol Surg, 2010 - Cited by 2
When the drawdown pressure amounts to a value below the dew point pressure, a minor droplet of condensate is shaped and accumulated in the close area of wellbore. As the accumulation happens, the saturation of the liquid will grow and a reduction in gas relative permeability will happen, therefore it will affect the productivity. Generally, condensate baking problem in gas wells is being deliberated and studied and numerous techniques have been suggested to solve the problem. The studying of condensate banking dynamics is essential to evaluate the productivity and behavior of the wells of the gas fields.
Consider a simple graph on vertices and edges together with a total labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say defined by for all where Also, the value is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by and is the least for which G admits edge irregular h-labeling. In this article, for some common graph families are examined. In addition, an open problem is solved affirmatively.
Enamel White Spot Lesions (EWSLs) are a common dental condition characterized by being opaque or chalky white in appearance. In this review, an overview of the etiology, prevention, and treatment techniques for EWSLs is presented. Enamel demineralization caused by bacteria in dental plaque which releases acids upon the consumption of fermentable carbohydrates causing mineral loss is thought to be the main cause of those lesions, which could be predisposed through orthodontic treatment, poor diet, inadequate oral hygiene and certain medical conditions. So, sustaining an adequate carbohydrate consumption, proper fluoride exposure and good oral hygiene are some of the practices which aid in these lesions’ prevention. Although the suc
... Show MoreIn many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show More