Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 15 2025
Journal Name
Dentistry 3000
Salivary Caries-Related Microorganisms and Demographics of a Group of Children
...Show More Authors

Objective: The purpose of this study was to determine the association between caries related microorganisms in children’s saliva, such as Streptococcus mutans and lactobacilli, and their demographic factors. Methods: This study involved a sample of 135, both sexes with an age range between 3 and 10 years. Unstimulated saliva was obtained and diluted in normal saline. Saliva was then placed in selective media. Salivaris agar was used for mutans streptococci while Rogosa agar for lactobacilli. After incubation, Streptococcus mutans counting of CFU (colony forming units) with morphology characterization and numbers of CFU per milliliter of saliva for lactobacilli. Demographic factors information was collected using a questionnaire.

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Engineering
A Review of the Asphalt Mixtures Containing Recycled Solid Waste Materials
...Show More Authors

Landfill and incineration are the most common and widely used methods to dispose of solid wastes; both of these techniques are considered the main sources of pollution in the world due to the harmful toxic emissions that are considered an environmental problem. Because of the large areas used by landfills, they are not always considered an economical method. With the increase in the production of solid materials, solid wastes increase the pressure on incinerators and landfills, making the environmental pollution hazard more serious. Instead, these waste materials can be used in some other applications. One of the most important of these applications is asphalt pavements, which are the most used types of pavements in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 04 2025
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Exploring the Relationship Between Urolithiasis and Hypertension: A Cross-Sectional Study
...Show More Authors

Background: Urolithiasis and hypertension are prevalent and clinically significant conditions in the Middle East, both influenced by shared metabolic and environmental risk factors. Understanding the potential association between them is important for guiding prevention strategies. Objective: To explore the relationship between urolithiasis and hypertension in a sample of Iraqi adult patients. Methods: A cross-sectional observational study was conducted at Alkindy Teaching Hospital, Baghdad, from September 2024 to March 2025. Participants included 237 patients with confirmed urinary tract stones and 244 controls confirmed to be stone-free, matched for age and sex. Exclusion criteria included secondary hypertension, chronic kidney di

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Journal Of Engineering
Implementation of a Proposed Load-Shedding System Using Altera DE2 FPGA
...Show More Authors

A load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
A prospective study of colonoscopic examination at al-kindy teaching hospital
...Show More Authors

Background: Fiber-optic endoscopy is an important
investigation of the large intestine, whether or not the
radiologist (barium enema) has discovered a lesion in
the bowel. Colonoscopy affords a unique opportunity
to direct visualization of entire colonic mucosa. At
the same time, the physician can obtain biopsy specimens, remove polyps, and decompress volvuli.
Most experienced endoscopists and well prepared
patients can reach the cecum in over 90% of patients.
If colonoscopy is properly performed, it has a low
risk of complications, such as perforation and bleeding.
Methods: A total of 70 consecutive patients admitted
to Endoscopy department at Al-Kindy Teaching hospital from September- 2008 to July-2009.

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 29 2026
Journal Name
Journal Of The College Of Education
A New Text from Ur III dynasty on Ba’aga, the fattener
...Show More Authors

يعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته م

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 15 2019
Journal Name
Research Journal Of Pharmaceutical, Biological And Chemicalsciences
Biological Activities of Amino Acid Derivatives and their Complexes a Review
...Show More Authors

AASAH Enass J Waheed, Shatha MH Obaid, Research Journal of Pharmaceutical, Biological and Chemical Sciences, 2019 - Cited by 5

View Publication
Publication Date
Wed Dec 15 2021
Journal Name
Abstract And Applied Analysis
Dynamical Behaviors of a Fractional-Order Three Dimensional Prey-Predator Model
...Show More Authors

In this paper, the dynamical behavior of a three-dimensional fractional-order prey-predator model is investigated with Holling type III functional response and constant rate harvesting. It is assumed that the middle predator species consumes only the prey species, and the top predator species consumes only the middle predator species. We also prove the boundedness, the non-negativity, the uniqueness, and the existence of the solutions of the proposed model. Then, all possible equilibria are determined, and the dynamical behaviors of the proposed model around the equilibrium points are investigated. Finally, numerical simulations results are presented to confirm the theoretical results and to give a better understanding of the dynami

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Fri Oct 01 2010
Journal Name
J Saudi Soc Dermatol Dermatol Surg
Outbreak of Thallium poisoning among Iraqi Patients: A case descriptive study
...Show More Authors

KE Sharquie, GA Ibrahim, AA Noaimi, HK Hamudy, J Saudi Soc Dermatol Dermatol Surg, 2010 - Cited by 2

View Publication