Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Background: Vitamin D deficiency/ insufficiency is common in different age groups in both genders especially among pregnant women and neonates where it is associated with several adverse outcomes including preeclampsia and preterm delivery. Objectives: To assess the extent of vitamin D deficiency/ insufficiency among mothers and their neonates and some factors related to it and identify some adverse outcomes of the deficiency/ insufficiency on neonates (preterm birth and low birth weight). Subject and Methods: A cross-sectional study was conducted on 88 Iraqi pregnant women and neonates admitted to “Al-Elwiya teaching hospital for maternity” in Baghdad- Al-Rusafah from 1st of June 2019 to 31st of August 2019. Dat
... Show MoreThe current work aims to evaluate the association between genetic mutations in thymidylate synthetase (
Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreBackground: Vitamin D deficiency/ insufficiency is common in different age groups in both genders especially among pregnant women and neonates where it is associated with several adverse outcomes including preeclampsia and preterm delivery.
Objectives: To assess the extent of vitamin D deficiency/ insufficiency among mothers and their neonates and some factors related to it and identify some adverse outcomes of the deficiency/ insufficiency on neonates (preterm birth and low birth weight).
Subject and Methods: A cross-sectional study was conducted on 88 Iraqi pregnant women and neonates admitted to “Al-Elwiya teaching hospital for maternity” in Baghdad- Al
... Show MoreThe bile salt hydrolase gene (bshA), encoding bile salt hydrolase enzyme (EC 3.5.1.24) from probiotic isolate Lactobacillus acidophilus Ar strain which is responsible for assimilation cholesterol were studied in the present work. About 801 bp in length DNA fragment of Lb. acidophilus Ar strain was amplified by PCR techniques. Two restriction sites (PstI/SacI) were added to each end of that fragment for manipulation of DNA during cloning. Amplified fragment inserted into pJET1.2\blunt end vector and pMG36e vector respectively. pJET1.2\blunt end vector is overexpression plasmid for E. coli MC1022, and pMG36e vector is a shuttle vector which is able to replicate in both E. coli and lactic acid bacteria. The resulted constructs were named as pJ
... Show MoreNominal ellipsis is a linguistic phenomenon found in English and Arabic .It is
based on leaving out a part of a nominal construction or more for the sake of good
style , compactness and connectedness .This phenomenon is found in the language of
the Glorious Qur’an .The study in hand is concerned with how translators handle
translating Qur’anic verses which contain ellipted nouns , i ,e. , to what extent the
translated Qur’anic verses are close to the original ones , and to what extent their
translations serve understanding the meanings of the glorious verses while at the
same time maintaining their beauty in style. The study aims at shedding light on
nominal ellipsis in English and Arabic .The study undertak
This study was undertaken to introduce a fast, accurate, selective, simple and environment-friendly colorimetric method to determine iron (II) concentration in different lipstick brands imported or manufactured locally in Baghdad, Iraq. The samples were collected from 500-Iraqi dinars stores to establish routine tests using the spectrophotometric method and compared with a new microfluidic paper-based analytical device (µPAD) platform as an alternative to cost-effective conventional instrumentation such as Atomic Absorption Spectroscopy (AAS). This method depends on the reaction between iron (II) with iron(II) selective chelator 1, 10-phenanthroline(phen) in the presence of reducing agent hydroxylamine (HOA) and sodium acetate (NaOAc) b
... Show More|
The research problem lies in the lack of accurate scientific perceptions concerning the reality of the communicator and the factors influencing his job. The research is aimed at introducing the communicator in the university press, clarifying the obstacles facing him, and uncovering the level of his job satisfaction and his visions of developing his work. The researcher adopted the survey method in the collection, analysis, and interpretation of the data using a questionnaire. A set of results and conclusions has been reached, most importantly are:
*The communicator performs multiple missions including writing, editing, and collecting info |
The research aims to identify the impact of managing performance's employees in building intellectual capital, Because employing the practice of managing the performance of employees may acquire familiar skills to improve their performance and reflect on the construction of intellectual capital in the surveyed area, Especially that the independent dimension represented by the management of the performance of employees is one of the important topics that has received attention in the world of management in general and human resource management in particular. While the adopted dimension was represented by Intellectual capital in the important practice of human resource management in the increasing of their knowledge, to
... Show MoreIn their cross-sectional study, Al-Rubaye et al studied the extent of vitamin D (VD) deficiency/ insufficiency, factors affecting its degree, and the adverse outcomes of the altered VD status among a group of mothers and their neonates from Baghdad, Iraq. They found that 96.6% of the mothers had VD deficiency/ insufficiency compared to 86.4% in their neonates. Maternal VD levels and neonatal weights were significantly correlated with neonatal VD levels. We believe that the study results need to be revised. This is based two points listed in this letter to editor