Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed May 01 2024
Journal Name
Scientific Visualization
Shadow Detection and Elimination for Robot and Machine Vision Applications
...Show More Authors

Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
The Convergence of Iterative Methods for Quasi δ-Contraction Mappings
...Show More Authors
Abstract<p>In this article, we will present a quasi-contraction mapping approach for D iteration, and we will prove that this iteration with modified SP iteration has the same convergence rate. At the other hand, we prove that the D iteration approach for quasi-contraction maps is faster than certain current leading iteration methods such as, Mann and Ishikawa. We are giving a numerical example, too.</p>
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Aug 01 2017
Journal Name
Iosr Journal Of Dental And Medical Sciences (iosr-jdms)
Utilizing Home Pregnancy Test Kits for Diagnosis of Leaking Liquor
...Show More Authors

Before the start of delivery, any membranes rupture could be named as a premature rupture of membranes (PROM), which may need special obstetrical interactions to minimize perinatal complications, it is important topromptly diagnose PROM, the method used should be accurate, cheap, simple, and widely available. This was exactly the idea behind this study to use an ordinary pregnancy test kit aiming to confirm presence of PROM.Over a 6 months’ period, 60 pregnant women with a history of leaking liquor and a positive speculum examination for amniotic fluid pooling were collected prospectively and compared with other 60 women (control group) with uneventful pregnancy. Majority of patients with positive leaking liquor signs and symptoms had a p

... Show More
View Publication
Publication Date
Wed Feb 07 2018
Journal Name
Proceedings Of The 2018 4th International Conference On Mechatronics And Robotics Engineering
Secure Transition for Robotic Surgery With Elliptic Curve Diffie Hellman
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jun 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Formulation of Multi-Purpose Grease for Use under Severe Conditions
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Arduino-Based Controller for Sequence Development of Automated Manufacturing System
...Show More Authors

It has become necessary to change from a traditional system to an automated system in production processes, because it has high advantages. The most important of them is improving and increasing production. But there is still a need to improve and develop the work of these systems. The objective of this work is to study time reduction by combining multiple sequences of operations into one process. To carry out this work, the pneumatic system is designed to decrease\ increase the time of the sequence that performs a pick and place process through optimizing the sequences based on the obstacle dimensions. Three axes are represented using pneumatic cylinders that move according to the sequence used. The system is implemented and

... Show More
Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Oct 31 2020
Journal Name
Eastern-european Journal Of Enterprise Technologies
Design and development of high-accuracy machine for wire bending
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Improved Firefly Algorithm with Variable Neighborhood Search for Data Clustering
...Show More Authors

Among the metaheuristic algorithms, population-based algorithms are an explorative search algorithm superior to the local search algorithm in terms of exploring the search space to find globally optimal solutions. However, the primary downside of such algorithms is their low exploitative capability, which prevents the expansion of the search space neighborhood for more optimal solutions. The firefly algorithm (FA) is a population-based algorithm that has been widely used in clustering problems. However, FA is limited in terms of its premature convergence when no neighborhood search strategies are employed to improve the quality of clustering solutions in the neighborhood region and exploring the global regions in the search space. On the

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2009
Journal Name
2009 Ieee Symposium On Industrial Electronics &amp; Applications
Assessing combinatorial interaction strategy for reverse engineering of combinational circuits
...Show More Authors

View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Wed Jan 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimate for Survival and Related Functions of Weighted Rayleigh Distribution.
...Show More Authors

     In this paper, we introduce a new class of Weighted Rayleigh Distribution based on two parameters, one is the scale parameter and the other is the shape parameter introduced in Rayleigh distribution. The main properties of this class are derived and investigated . The moment method and least square method are used to obtain estimators of parameters of this distribution. The probability density function,   survival function, cumulative distribution and hazard function are derived and found. Real data sets are collected to investigate two methods that depend on in this study. A comparison is made between two methods of estimation and clarifies that MLE method is better than the OLS method by using the mea

... Show More
View Publication Preview PDF
Crossref (1)
Crossref