Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
The aim of the research is to shed light on the stages of developing the Iraqi virtual science Library(IVSL) project, and to define its distinctive role in providing all kinds of electronic resources to researchers from professors and graduate students, to identify its contents , the entry interfaces and applications of use, and provide them through electronic portals to publishing houses, research institutions and international universities, The research sample included the teaching staff and researchers participating in educational qualification courses at the Continuing Education Center at the University of Baghdad, The research population and its sample consisted of the category of (IVSL) users, and its sample (387) users. Analysis meth
... Show MoreA set of hydro treating experiments are carried out on vacuum gas oil in a trickle bed reactor to study the hydrodesulfurization and hydrodenitrogenation based on two model compounds, carbazole (non-basic nitrogen compound) and acridine (basic nitrogen compound), which are added at 0–200 ppm to the tested oil, and dibenzotiophene is used as a sulfur model compound at 3,000 ppm over commercial CoMo/ Al2O3 and prepared PtMo/Al2O3. The impregnation method is used to prepare (0.5% Pt) PtMo/Al2O3. The basic sites are found to be very small, and the two catalysts exhibit good metal support interaction. In the absence of nitrogen compounds over the tested catalysts in the trickle bed reactor at temperatures of 523 to 573 K, liquid hourly space v
... Show MoreThis work presents a simple method for determination of the neutron reflection coefficient (n) as a function of different neutron reflector materials.A laboratory neutron source (Am-Be) with activity of 16 ci is employed with a (BF3) neutron detector. Am-BeThree types of reflector materials are used as samples, the thickness of each sample is (5cm).It is found that( ?7) is: -For polyethlyene = 0.818
This paper presents the design and analysis of composite right left hand (CRLH) electromagnetic bandgap (EBG) structure. The proposed unit cell is consistent of a dielectric substrate with dimensions of 5×5×1 mm 3 made of FR4-Epoxy with εr = 4.4 underneath of a conductive patch with dimensions of 4.4×4.4mm 2 . The unit cell is structured to perform a negative permittivity (ε) and negative permeability (µ) in different bands. The proposed unit cell is developed to 5G systems in the sub-6GHz bands. In this work, a complete analysis of the unit cell in terms of Sparameters, constitutive parameters and refraction index are evaluated using HFSS simulation package based on Finite Element Method (FEM).
Ni2O3 nanomaterial, a phase of nickel oxide, is synthesized by a simple chemical process. The pure raw materials used in the present process were nickel chloride hexahydrate NiCl2.6H2O and potassium hydroxide KOH by utilizing temperature at 250 oC for 2 hour. The structural, morphological and optical properties of the synthesized specimens of Ni2O3 were investigated employing diverse techniques such as XRD, AFM, SEM and UV-Vis, respectively. The XRD technique confirms the presence of Ni2O3 nanomaterial with crystal size of 57.083 nm which indexing to the (2θ) of 31.82; this results revealed the Ni2O3 was a phase of nickel oxide with Nano structure. The synthesized Ni2O3 will be useful in manufacturng electrodes materials f
... Show MoreInterest in belowground plant growth is increasing, especially in relation to arguments that shallow‐rooted cultivars are efficient at exploiting soil phosphorus while deep‐rooted ones will access water at depth. However, methods for assessing roots in large numbers of plants are diverse and direct comparisons of methods are rare. Three methods for measuring root growth traits were evaluated for utility in discriminating rice cultivars: soil‐filled rhizotrons, hydroponics and soil‐filled pots whose bottom was sealed with a non‐woven fabric (a potential method for assessing root penetration ability). A set of 38 rice genotypes including the Oryza
In this research the a-As flims have been prepared by thermal evaporation with thickness 250 nm and rata of deposition r_d(1.04nm/sec) as function to annealing temperature (373 and 473K), from XRD analysis we can see that the degree of crystalline increase with T_a, and I-V characteristic for dark and illumination shows that forward bias current varieties approximately exponentially with voltage bias. Also we found that the quality factor and saturation current dependence on annealing temperatures.
The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show More