Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Autism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D
... Show MoreSchiff bases, named after Hugo Schiff, are aldehyde- or ketone-like compounds in which the carbonyl group is replaced by imine or azomethine group. They are widely used for industrial purposes and also have a broad range of applications as antioxidants. An overview of antioxidant applications of Schiff bases and their complexes is discussed in this review. A brief history of the synthesis and reactivity of Schiff bases and their complexes is presented. Factors of antioxidants are illustrated and discussed. Copyright © 2016 John Wiley & Sons, Ltd.
Electricity consumption for household purposes in urban areas widely affects the general urban consumption compared to other commercial and industrial uses, as household electricity consumption is affected by many factors related to the physical aspects of the residential area such as temperature, housing unit area, and coverage ratio, as well as social and economic factors such as family size and income, to reach the extent of the influence of each of the above factors on the amount of electricity consumed for residential uses, a selected sample of a residential area in the city of Baghdad was studied and a field survey conducted of the characteristics of that sample and the results analyzed and modeled statistically in relation to the amo
... Show MoreThe present study aimed at examining the factors that affect the choice of A major among a sample of BA fe(male) students at the levels 3-8 in King Abdulaziz University (KAU), in Jeddah, Saudi Arabia. To meet this objective, a descriptive survey method was used together with a questionnaire that consisted of 4 axes to answer the central question: What are the factors affecting the choice of a major at the university? Results have shown that the item that measured the students’ ability to choose the major ranked (First); it was concerned with the effect on the students' choice of his/her major in the university. On the last position and with respect to this effect came the professional tendencies and desires. Results have also shown tha
... Show MoreThis article comprehensively examines the history, diagnosis, genetics, diversity, and treatment of SARS-CoV-2. It details the emergence of coronaviruses over the past 50 years, including the coronavirus from 2019 and its subsequent mutations, along with updated information about this virus. This review explains the development and nomenclature of coronaviruses, their cellular invasion through glycoprotein spikes binding to ACE-2 receptors, and the mechanism of cell entry via endocytosis. Diagnosis methods for COVID-19, including nucleic acid amplification, serology, and imaging techniques like chest X-ray and CT scan tests, are discussed. Treatment approaches for COVID-19 are outlined, emphasizing healthcare, antiviral medications like Rem
... Show MoreThe Financial authority is considered as one of the most of benefited parts from financial statements which depends on it in process of accounting in taxes as basis to determine The Tax Base , but no confidence from financial authority part in objectivity of income financial information in them for many of limited companies led to no dependence on them to specify taxation contain & dependence on yearly regulations that issued them. To enhance the confidence of financial authority to these lists must meet its requirements, because the menus Fulfill the requirements of the financial authority increases the confidence in these statements and therefore reliable in determining the tax base. So this research aims to speci
... Show More