Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
A particular solution of the two and three dimensional unsteady state thermal or mass diffusion equation is obtained by introducing a combination of variables of the form,
η = (x+y) / √ct , and η = (x+y+z) / √ct, for two and three dimensional equations
respectively. And the corresponding solutions are,
θ (t,x,y) = θ0 erfc (x+y)/√8ct and θ( t,x,y,z) =θ0 erfc (x+y+z/√12ct)
Background: Congenital club foot is a complex deformity of foot .It is a collection of different abnormalities, with different etiologies. Consequently, Severity varies with difficulties in evaluating treatment strategies with outcome results. The treatment of congenital club foot remains controversial. Usually, the orthopedist's goal is to obtain anatomically and functionally normal feet in all patients. Objective: To asses short term follow up result of conservatively treated club feet in relation to the age
... Show MoreA case of angiolymphoid hyperplasia with eosinophilia (ALH) is reported in a 42-year-old woman who developed multiple nodules behind the ear. Angiolymphoid hyperplasia with eosinophilia usually occurs on the head and neck of young adults and is more common in women than in men. Characteristic histologic features of ALH present in this case included proliferation of thick-walled blood vessels lined by prominent endothelial cells, infiltration of the interstitium by chronic inflammatory cells (mainly eosinophils), and presence of lymphoid follicles with germinal centers. The patient referred for surgeon for complete excision. in this context , cases previously described in the literature, and the differential diagnosis of ALH are discussed
... Show MoreKing Ghazi (1933-1939) was of the Arabic characters that characterized national and
patriotic spirit and that faced the British policy in all its aspects.
King Ghazi distinguished as of Arab nationalist tendencies and called for the
liberalization of Arab lands which were under the rule of the Ottoman Empire. He called for
reunification under the one Arab country, Hence came the King invitations to liberate Kuwait
from the British protectorate and consolidated with Iraq.
King Ghazi established a private radio station in the royal palace (AL zzaahoor) palace
and provided special programs to return of Kuwait to Iraq, this radio station was The
prominent role in the revitalization of the Kuwaiti National Movement, an
The aim: to evaluate combined microscopy techniques for determining the morphological and optical properties of methadone hydrochloride (MDN) crystals. Materials and methods: MDN crystal formation was optimized using a closed container method and crystals were characterized using polarized light microscope (PLM), scanning electron microscopy (SEM) and confocal microscopy (CM). SEM and CM were used to determine MDN crystal thickness and study its relationship with crystal retardation colours using the Michel-Levy Birefringence approach. Results: Dimensions (mean±SD) of diamond shaped MDN crystals were confirmed using SEM and CM. Crystals were 46.4±15.2 Vs 32.0±8.3 µm long, 28.03±8.2 Vs 20.85±5.5 µm wide, and 6.62±
... Show MoreBackground: The grading systems of salivary mucoepidermoid carcinoma depend on different histologic and morphologic features. The aim of this study was to compare between Auclair and Brandwein systems according to their histologic criteria, and the type of cell predominant. Materials and Methods: Twenty-one case included hematoxylin-eosin (H&E) stained tissue slides that were diagnosed as MEC, originally categorized into low and high grade type regardless of the grading system, have meticulously undergone histopathologic review. The sample was graded according to criteria owing to Auclair and Brandwein methods. The predominant type of cells was determined by microscopic examination according to grade of tumor. Results: Regarding the
... Show MoreNi2O3 nanomaterial, a phase of nickel oxide, is synthesized by a simple chemical process. The pure raw materials used in the present process were nickel chloride hexahydrate NiCl2.6H2O and potassium hydroxide KOH by utilizing temperature at 250 oC for 2 hour. The structural, morphological and optical properties of the synthesized specimens of Ni2O3 were investigated employing diverse techniques such as XRD, AFM, SEM and UV-Vis, respectively. The XRD technique confirms the presence of Ni2O3 nanomaterial with crystal size of 57.083 nm which indexing to the (2θ) of 31.82; this results revealed the Ni2O3 was a phase of nickel oxide with Nano structure. The synthesized Ni2O3 will be useful in manufacturng electrodes materials f
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreBackground: The main aim of the present study is to qualify and quantify voids formation of root canals obturated with GuttaCore (GC) and experimental Hydroxyapatite polyethylene (HA/PE) as new carrier-based root canal fillings by using micro computed tomography scan. Materials and methods: In the present study, eight straight single-rooted human permanent premolar teeth are selected and disinfected, then stored in distilled water. The teeth decoronated leaving a root length of 12mm each. The root canals instrumented by using crown down technique and the apical diameter of the root canal prepared to a size # 30/0.04 for achieving standardized measurements. A 5mL of 17% EDTA used to remove the smear layer followed by 5mL of 2.5% NaOCl and r
... Show More