Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2017
Journal Name
Iosr Journal Of Dental And Medical Sciences (iosr-jdms)
Utilizing Home Pregnancy Test Kits for Diagnosis of Leaking Liquor
...Show More Authors

Before the start of delivery, any membranes rupture could be named as a premature rupture of membranes (PROM), which may need special obstetrical interactions to minimize perinatal complications, it is important topromptly diagnose PROM, the method used should be accurate, cheap, simple, and widely available. This was exactly the idea behind this study to use an ordinary pregnancy test kit aiming to confirm presence of PROM.Over a 6 months’ period, 60 pregnant women with a history of leaking liquor and a positive speculum examination for amniotic fluid pooling were collected prospectively and compared with other 60 women (control group) with uneventful pregnancy. Majority of patients with positive leaking liquor signs and symptoms had a p

... Show More
View Publication
Publication Date
Thu Jun 16 2022
Journal Name
Clean Technologies
Performance Evaluation of Roughened Solar Air Heaters for Stretched Parameters
...Show More Authors

Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of Pure And Applied Mathematics
Linear Regression Model Using Bayesian Approach for Iraqi Unemployment Rate
...Show More Authors

In this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Fabrication of Advanced Cement Mortar for Building Anti-Bacterial Applications
...Show More Authors

In this research, we have added nano anatase TiO2 as a partial replacement of Portland cement by a weight percentage of (0.25 to 1%) for the development of properties for protection against bacteria. The control mix was made by using "the cement to sand" proportion about (1: 2.75) with the "water to cement" proportion of (0.5) to study the structure, porosity, water absorption, density, mechanical properties, as well as anti-bacterial behavior. Inspections have been done such as scanning electron microscopy (SEM), and atomic force microscope (AFM) for mortar. Experimental results showed that after the addition of Nano powders in cement mortar, the structural properties improved significantly with the development of hydration o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Equivalence of Some Iterations for Class of Quasi Contractive Mappings
...Show More Authors
Abstract<p>In this article, we recalled different types of iterations as Mann, Ishikawa, Noor, CR-iteration and, Modified SP_iteration of quasi δ-contraction mappings, and we proved that all these iterations equivalent to approximate fixed points of δ-contraction mappings in Banach spaces.</p>
View Publication
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Mathematical Models Used for Brachytherapy Treatment Planning Dose Calculation Algorithms
...Show More Authors

Brachytherapy treatment is primarily used for the certain handling kinds of cancerous tumors. Using radionuclides for the study of tumors has been studied for a very long time, but the introduction of mathematical models or radiobiological models has made treatment planning easy. Using mathematical models helps to compute the survival probabilities of irradiated tissues and cancer cells. With the expansion of using HDR-High dose rate Brachytherapy and LDR-low dose rate Brachytherapy for the treatment of cancer, it requires fractionated does treatment plan to irradiate the tumor. In this paper, authors have discussed dose calculation algorithms that are used in Brachytherapy treatment planning. Precise and less time-consuming calculations

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Nov 20 2020
Journal Name
Solid State Technology
Comparative Study for Bi-Clustering Algorithms: Historical and Methodological Notes
...Show More Authors

View Publication
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Transition rates and microscopic effective charges for 16C exotic nucleus
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus