Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
The efficiency of internal combustion engines (ICE) is usually about thirty percent of the total energy of the fuel. The residual energy is lost in the exhaust gas, the lubrication, and the cooling water in the radiators. Recently much of the researcher’s efforts have focused on taking advantage of wasted energy of the exhaust gas. Using a thermoelectric generator (TEG) is one of the promising ways. However, TEG depends entirely on the temperature difference, which may be offered by the exhaust muffler. An experimental test has been conducted to study the thermal performance of a different muffler internal design. The researchers resort to the use of lost energy in an ICE using TEG, which is one of the ways to take adv
... Show MoreThe research aims to characterize the strategic plan of the Educational Professional Development Center, to reveal the most important training needs for teachers from this center, to reveal the extent to which this center meets those needs, and to identify the differences between teacher responses about the degree of importance, availability of those needs according to variables of sex, specialization, and years of experience. This descriptive study adopted a questionnaire applied to (256) teachers in the K.S.A. The results of the study showed that all training needs ranged in the degree of importance from large to very large and that the most important were the skills associated with communicating with members of the learning community.
... Show MoreThe present work is to investigate the feasibility of removal vanadium (V) and nickel (Ni) from Iraqi heavy gas oil using activated bentonite. Different operating parameters such as the degree of bentonite activation, activated bentonite loading, and operating time was investigated on the effect of heavy metal removal efficiency. Experimental results of adsorption test show that Langmuir isotherm predicts well the experimental data and the maximum bentonite uptake of vanadium was 30 mg/g. The bentonite activated with 50 wt% H2SO4 shows a (75%) removal for both Ni and V. Results indicated that within approximately 5 hrs, the vanadium removal efficiencies were 33, 45, and 60% at vanadium loadings of 1
... Show MoreA new two-way nesting technique is presented for a multiple nested-grid ocean modelling system. The new technique uses explicit center finite difference and leapfrog schemes to exchange information between the different subcomponents of the nested-grid system. The performance of the different nesting techniques is compared, using two independent nested-grid modelling systems. In this paper, a new nesting algorithm is described and some preliminary results are demonstrated. The validity of the nesting method is shown in some problems for the depth averaged of 2D linear shallow water equation.
The operating characteristics of optoelectronic devices depend critically on the properties physical of the constituent materials, interesting compound has been focused on this research formed from group III and V of the periodic table. Thin film n-InSb heterjuntion were successfully fabricated on p-Si substrates by thermal evaporation technique at different annealing temperature (as prepared, 400,500,600) °C. The effect of annealing temperature on the structural, surface morphology, optical and optoelectronic properties of InSb films were investigated and studied. The crystal structure of the film was characterized by X-ray diffraction and techniques. AFM techniques inspect the surface morphology of InSb films, the study presented the val
... Show MoreThere are many different methods for analysis of two-way reinforced concrete slabs. The most efficient methods depend on using certain factors given in different codes of reinforced concrete design. The other ways of analysis of two-way slabs are the direct design method and the equivalent frame method. But these methods usually need a long time for analysis of the slabs.
In this paper, a new simple method has been developed to analyze the two-way slabs by using simple empirical formulae, and the results of final analysis of some examples have been compared with other different methods given in different codes of practice.
The comparison proof that this simple proposed method gives good results and it can be used in analy
... Show MoreThe research discusses the mechanism for analyzing the salary scale in the public sector through an analysis of grades, their stages, occupants and their financial entitlements, and the extent to which the information obtained for their investment in strategic planning, conducting correction and treatment can be used. The salaries of the employees in them, whose number is (1117) employees, to be a field of research, as the salary structure in it for the year 2019 was analyzed by relying on a number of statistical tools in the analysis process, including the arithmetic circles, upper limits, minimum limits and percentage, and with
... Show MoreCopper with different concentrations doped with zinc oxide nanoparticles were prepared from a mixture of zinc acetate and copper acetate with sodium hydroxide in aqueous solution. The structure of the prepared samples was done by X-ray diffraction, atomic force microscopy (AFM) and UV-VIS absorption spectrophotometer. Debye-Scherer formula was used to calculate the size of the prepared samples. The band gap of the nanoparticle ZnO was determined by using UV-VIS optical spectroscopy.
In this paper was discussed the process of compounding two distributions using new compounding procedure which is connect a number of life time distributions ( continuous distribution ) where is the number of these distributions represent random variable distributed according to one of the discrete random distributions . Based on this procedure have been compounding zero – truncated poisson distribution with weibell distribution to produce new life time distribution having three parameter , Advantage of that failure rate function having many cases ( increasing , dicreasing , unimodal , bathtube) , and study the resulting distribution properties such as : expectation , variance , comulative function , reliability function and fa
... Show MoreAA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show More