Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
This study has contributed to understanding a delayed prey-predator system involving cannibalism. The system is assumed to use the Holling type II functional response to describe the consuming process and incorporates the predator’s refuge against the cannibalism process. The characteristics of the solution are discussed. All potential equilibrium points have been identified. All equilibrium points’ local stability analyses for all time delay values are investigated. The system exhibits a Hopf bifurcation at the coexistence equilibrium, which is further demonstrated. The center manifold and normal form theorems for functional differential equations are then used to establish the direction of Hopf bifurcation and the stability of the per
... Show MoreHuman interferon as is the case in all kinds of interferon has complex effects but all share their impact on preventing the proliferation of viruses and preventing or reducing human Alantervjørn conversion occurs if the cell is in preventing the growth of the virus when interferon Balnmstqubl connects
This study has been developed axes of the search, including: Search (deliberative) language and idiomatically, and Description Language (b social phenomenon), and the definition of the theory of (acts of speech), and discussed the problem of the conflict between tradition and innovation, as defined objectively have a target aimed at reviving the deliberative thought when Arab scholars , and the balance between the actual done Arab and Western rhetoric, but Meet in intellectual necessity, a sober reading that preserve the Arab language prestige, and its position in the light of the growing tongue Sciences, as long as we have inherited minds unique, and heritage huge able to consolidate the Arab theory lingual in linguistics.
Average interstellar extinction curves for Galaxy and Large Magellanic Cloud (LMC) over the range of wavelengths (1100 A0 – 3200 A0) were obtained from observations via IUE satellite. The two extinctions of our galaxy and LMC are normalized to Av=0 and E (B-V)=1, to meat standard criteria. It is found that the differences between the two extinction curves appeared obviously at the middle and far ultraviolet regions due to the presence of different populations of small grains, which have very little contribution at longer wavelengths. Using new IUE-Reduction techniques lead to more accurate result.
Researching the effects of the research and technological development contract, determining its extent and demarcating the boundaries of the obligations imposed in it, is the cornerstone of economic growth and development, because defining these obligations removes the ambiguity and conflict between interests, by stating the rights owed to each party and even trying to reconcile them, or impose protection by specifying guarantees that are compatible with the essence of the R&D contract, For the purpose of studying the subject thoroughly, we will divide this research into two sections. The first is devoted to identifying the parties to the research and technological development contract. As for the other topic, we will explain the obligation
... Show MoreThis paper presents a study for the influence of magnetohydrodynamic (MHD) on the oscillating flows of fractional Burgers’ fluid. The fractional calculus approach in the constitutive relationship model is introduced and a fractional Burgers’ model is built. The exact solution of the oscillating motions of a fractional Burgers’ fluid due to cosine and sine oscillations of an infinite flat plate are established with the help of integral transforms (Fourier sine and Laplace transforms). The expressions for the velocity field and the resulting shear stress that have been obtained, presented under integral and series form in terms of the generalized Mittag-Leffler function, satisfy all imposed initial and boundary conditions. Finall
... Show More