Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe experiment was conducted to investigate the predation behavior of crustacean
zooplankton M. albidus for first instar mosquito larvae of Culex quinquefasciatus, which may
be represented as an indicator of the species activity for biological control of mosquito larvae.
Results revealed that females spend 6.30 min. as average to find the mosquito larval and
to catch it, whereas it consumed 7.20 min. in digestion of the prey. On the other hand the
corresponding means for male were 10.29 and 4.00 min. respectively. Differences between
females and males were not significant for the time consumed to catch the prey whereas the
differences were significant (P < 0.05) in regard to the time consumed to digest the p
Previous studies on the synthesis and characterization of metal chelates with uracil by elemental analysis, conductivity, IR, UV-Vis, NMR spectroscopy, and thermal analysis were covered in this review article. Reviewing these studies, we found that uracil can be coordinated through the electron pair on the N1, N3, O2, or O4 atoms. If the uracil was a mono-dentate ligand, it will be coordinated by one of the following atoms: N1, N3 or O2. But if the uracil was bi-dentate ligand, it will be coordinated by atoms N1 and O2, N3 and O2 or N3 and O4. However, when uracil forms complexes in the form of polymers, coordination occurs through the following atoms: N1 and N3 or N1 and O4.
Recent years have witnessed an increase in the use of composite coatings for numerous applications, including aerospace, aircraft, and maritime vessels. These materials owe this popularity surge to the superior strength, weight, stiffness, and electrical insulation they exhibit over conventional substances, such as metals. The growing demand for such materials is accompanied by the inevitable need for fast, accurate, and affordable nondestructive testing techniques to reveal any possible defects within the coatings or any defects under coating. However, typical nondestructive testing (NDT) techniques such as ultrasonic testing (UT), infrared thermography (IRT), eddy current testing (ECT), and laser shearography (LS) have failed to p
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreRheumatoid arthritis is a chronic, progressive, inflammatory autoimmune disease of unidentified etiology, associated with articular, extra-articular and systemic manifestation that require long-standing treatment. Taking patient’s beliefs about the prescribed medication in consideration had been shown to be an essential factor that affects adherence of the patient in whom having positive beliefs is an essential for better adherence. The purpose of the current study was to measure beliefs about medicines among a sample of Iraqi patients with Rheumatoid arthritis and to determine possible association between this belief and some patient-certain factors. This study is a cross-sectional study carried out on 250 already diagnosed rheumatoid
... Show More