Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Applying A* Path Planning Algorithm Based on Modified C-Space Analysis
...Show More Authors

In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Saudi Medical Journal
Striae distensae-like lesions. A cause of scarring alopecia among children.
...Show More Authors

KE Sharquie, MM Al-Waiz, AA Al-Nuaimy, Saudi medical journal, 2002 - Cited by 11

View Publication
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
A stylistic study of proisepoeme and congratulation from Hafiz Ibrahim's collection
...Show More Authors

A stylistic study in the poetry of Hafiz Ibrahim, praise be to God, Lord of the worlds, and prayers and peace be upon his best messengers, and the seal of his prophets, Muhammad and his good and pure family, and after ...
The poet Hafez Ibrahim is considered one of the well-known poets in the modern era, and his language was distinguished by sobriety, eloquence in expressions, and beautiful meanings And he had my journey in the study of his poetry a stylistic study, and the research came with an introduction in which the concept of stylistics was briefly explained, since it was studied by many researchers, then divided the research into three topics: I studied in the first the construction of the poem, and I stood at the most importan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
A CERTAIN SUBCLASS OF MULTIVALENT HARMONIC FUNCTIONS DEFINED BY RUSCHEWEYH DERIVATIVES
...Show More Authors
Abstract<p>We introduce a new class of harmonici multivalent functions define by generalized Rucheweyh derivative operator. We also obtain several interesting propertiesi such as sharp coefficienit estimates, distortioni bound, extreme points, Hadamardi product and other several results. Derivative; extreme points.</p>
View Publication Preview PDF
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 10 2019
Journal Name
Association Of Arab Universities Journal Of Engineering
Improvement of Earth Canals Constructed on a Gypseous Soil By Cement
...Show More Authors

View Publication
Publication Date
Tue Jun 27 2023
Journal Name
Journal Of Kufa For Chemical Sciences
Nanogold-Bound Copper Complexes and Their Various Applications: A Review Article
...Show More Authors

The term "nano gold," also known as "gold nanoparticles," is commonly used. These particles are extremely small, with a diameter of less than 100 nm, which is only a fraction of the width of a human hair. Due to their tiny size, nano gold particles are often found in a colloidal solution, where they are suspended in a liquid stabilizer. This colloidal gold is essentially another name for nano gold. The main method for producing gold nanoparticles in a colloidal solution is the citrate synthesis technique, which involves combining different solutions to precipitate the gold nanoparticles. In biological systems, copper complexes play a significant role at the active sites of many metalloproteins. These complexes have potential applications in

... Show More
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
A Stylistic Analysis of Two Selected, English and Arabic, War Poems
...Show More Authors

War as a human phenomenon, has its own literature. Poetry is a major genre in this literature. This paper is an attempt to investigate and analyse some stylistic features in two selected, English and Arabic, war poems. These poems share the same theme.Both promote the principle of sacrificing one’s own life for the sake of homeland.  This paper limits itself to analyse, thecontent words, tenses, semantic grouping of vocabulary and foregrounding in the two poems. The areas of analysis show great similarities in distributing the general content words (nouns, verbs, adjectives, and adverbs). In the analysis of the semantic areas of each content word, these poems reveal some similarities and some differences in their frequency rates.

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Openness Management by Figures as a Model of Integrity and Transparency
...Show More Authors

Competitive advantage is a substantial  strategic objective for organizations. It requires high levels in the quality of products and services provided to customers, continuous improvement of costing , care for creativity and innovative employees, and speed unique to the marketing and financial engineering, and business re-engineering processes. The situation in this area, requires actors to attract and develop human resources, including help in proper implementation of the strategic tasks that targeted by those institutions. According to the opinions and viewpoints of management scholars, the competitive advantage resource is the most important issue for organizations in the third millennium, which can be a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 05 2013
Journal Name
Robotica
Modeling, stability and walking pattern generators of biped robots: a review
...Show More Authors
SUMMARY<p>Biped robots have gained much attention for decades. A variety of researches have been conducted to make them able to assist or even substitute for humans in performing special tasks. In addition, studying biped robots is important in order to understand human locomotion and to develop and improve control strategies for prosthetic and orthotic limbs. This paper discusses the main challenges encountered in the design of biped robots, such as modeling, stability and their walking patterns. The subject is difficult to deal with because the biped mechanism intervenes with mechanics, control, electronics and artificial intelligence. In this paper, we collect and introduce a systematic discussion of modelin</p> ... Show More
View Publication
Scopus (39)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Sun Oct 21 2018
Journal Name
Iraqi Journal Of Physics
A simple voice communication using the modulation of the reflected light
...Show More Authors

There is no adopt in the importance of the optical communications in scientific civil and military applications because of it’s simplicity in manufacturing and it's low cost. The method of optical communication depends upon bearing the light beam the translated informations by a method called the light modulation. This method depends upon changing some light properties as frequency, amplitude and pulse duration according to the translating informations. The changes in the first two properties are concerned optically with the analog modulation while the third one concern at most with digital modulation. All past methods are expensive with low efficiency and needs electrical or magnetic fields. In this technique the source of voice used

... Show More
View Publication Preview PDF
Crossref