Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
In this study, a predicated formula is been proposed to find the shear strength of non-prismatic beams with or without openings. It depends on the contributions of concrete shear strength considering the beam depth variation and existing openings, shear steel reinforcements and defines the critical shear section, the effect of diagonal shear reinforcement, the effect of inclined tensile steel reinforcement, and the compression chord influence. The verification of the proposed formula has been conducted on the experimental test results of 26 non-prismatic beams with or without openings at the same loading conditions. The results reflect that the predicted formula finds the shear capacity of non-prismatic beams with openings, it is co
... Show MoreThis case series aims to evaluate patients affected with post COVID‐19 mucormycosis from clinical presentation to surgical and pharmacological treatment to improve the disease prognosis.
This case series was conducted at a specialized surgery hospital in Baghdad Medical City for over 10 months. Fifteen cases who had mild to severe COVID‐19 infections followed by symptoms similar to aggressive periodontitis, such as mobility and bone resorption around the multiple maxillary teeth, were included in this case series.
This research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions:
- Is it possible to examine praise poetry as a tagmeme?
- Is this analysis of great help in teaching English and Arabic to students in the College of Education?
The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9.
&nbs
... Show MoreIn this research work, a new type of concrete based on sulfur-melamine modification was introduced, and its various properties were studied. This new type of concrete was prepared based on the sulfur-melamine modification and various ingredients. The new sulfur-melamine modifier was fabricated, and its fabrication was confirmed by IR spectroscopy and TG analysis. The surface morphology resulted from this modifier was studied by SEM and EDS analysis. The components ratios in concrete, chemical and physical characteristics resulted from sulfur-melamine modifier, chemical and corrosion resistance of concrete, stability of concrete against water adsorption, stability of concrete against freezing, physical and mechanical properties and durabi
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreIbn al-Haytham is the pioneer of optics, which is a science that had described optics circumstances. Optics or landscape science as it was known by the Arab and Muslim scientists at the time when is a science known as the conditions of sighters in their quantity and quality as the proximity and distance from the beholder , the different forms , conditions and what mediate between the beholder and the microscopes , to explain useful knowledge of what obscures the sight of the conditions of sighters and is used to measure the space Distant criminality and mirrors.
Ibn al-Haitham wrote his famous book The Book of Mirrors and studied mistakes adopted the m
... Show MoreThe aim of this essay is to use a single-index model in developing and adjusting Fama-MacBeth. Penalized smoothing spline regression technique (SIMPLS) foresaw this adjustment. Two generalized cross-validation techniques, Generalized Cross Validation Grid (GGCV) and Generalized Cross Validation Fast (FGCV), anticipated the regular value of smoothing covered under this technique. Due to the two-steps nature of the Fama-MacBeth model, this estimation generated four estimates: SIMPLS(FGCV) - SIMPLS(FGCV), SIMPLS(FGCV) - SIM PLS(GGCV), SIMPLS(GGCV) - SIMPLS(FGCV), SIM PLS(GGCV) - SIM PLS(GGCV). Three-factor Fama-French model—market risk premium, size factor, value factor, and their implication for excess stock returns and portfolio return
... Show More