Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Sep 21 2012
Journal Name
Open Journal Of Obstetrics And Gynecology
Evaluation of thalamus echogenicity by ultrasound as a marker of fetal lung maturity
...Show More Authors

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Petroleum Research And Studies
A Numerical Study of Tertiary Oil Recovery by Injection of Low-Salinity Water
...Show More Authors

The injection of Low Salinity Water (LSWI) as an Enhanced Oil Recovery (EOR) method has recently attracted a lot of attention. Extensive research has been conducted to investigate and identify the positive effects of LSWI on oil recovery. In order to demonstrate the impact of introducing low salinity water into a reservoir, simulations on the ECLIPSE 100 simulator are being done in this work. To simulate an actual reservoir, an easy static model was made. In order to replicate the effects of injecting low salinity water and normal salinity, or seawater, the reservoir is three-phase with oil, gas, and water. It has one injector and one producer. Five cases were suggested to investigate the effect of low salinity water injection with differen

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Trends of poetic purposes towards praise: Dabal al-Khuzai's poetry is a model
...Show More Authors

Poetic objects may go towards a specific purpose and dissolve and interact with them to produce
A purpose characterized by the title but belongs to the U from afar.
The yarn goes towards praise with a purely horizontal relationship that mentions virtues but crowns them towards women.
In lamentation remember the virtues but crown them towards the dead.
In wisdom remember the virtues but crown them towards time.
In the description remember the virtues but crown them towards nature. All objects are inline
Horizontal We will prove this in the axes of research has required the plan to be a blind, five
The preamble, a brief overview of the life of Dabal All Khuzaie and the works and poets of the first axis
The direction

... Show More
View Publication Preview PDF
Publication Date
Sun May 10 2015
Journal Name
Al-academy
Performing processors of view between impressionism & superrealism (A comparative analysis): فريد خالد علوان
...Show More Authors

Addressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Nasq
The Impact of Harold Pinter’s Drama Upon the Iraqi Theatre: A Case Study
...Show More Authors

THE IMPACT OF BRITISH THEATER UPON IRAQI DRAMA

Publication Date
Sun Sep 14 2025
Journal Name
Magazine Aldhakwat Albedh
The impact of atheism on the individual and society, Iraq as a model
...Show More Authors

Atheists have spread in the modern era, so that atheism has become a bad phenomenon in the world in general and in Islamic societies in particular, so the research aims to study the individual and social effects left by atheism on the atheists themselves, and the research included multiple axes: atheism linguistically and idiomatically, atheism in the Qur’an Noble and Modern (and Contemporary) Atheism Statistics: and the reasons for atheism: Studying the phenomenon of atheism in Iraq as a model, then studying the effects of atheism: on the individual first, then atheism and its impact on society, then the conclusion, recommendations, sources and references

View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
a base The origin of permissive things And its impact on Islamic law
...Show More Authors

So I present in the hands of the honorable reader what God Almighty has made easy for me in terms of what I dealt with in the rule (the principle of permissive things) and what branches from it and what is related to it.
This research was divided into an introduction, a preface, three demands, and a conclusion.
The preamble is to explain the meaning of the rule in language and terminology and the definition of the legal rule and what is related to it. The first requirement is to explain the rule that we have in our hands and the words related to its text - and is it a fundamentalist or jurisprudential rule? .
As for the second requirement - in the difference of scholars and their opinions in whether the origin of things is permi

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 04 2023
Journal Name
Russian Journal Of General Chemistry
Synthesis and Characterization of Metals Complexes with Uracil and Uracil Derivatives (A Review)
...Show More Authors

Previous studies on the synthesis and characterization of metal chelates with uracil by elemental analysis, conductivity, IR, UV-Vis, NMR spectroscopy, and thermal analysis were covered in this review article. Reviewing these studies, we found that uracil can be coordinated through the electron pair on the N1, N3, O2, or O4 atoms. If the uracil was a mono-dentate ligand, it will be coordinated by one of the following atoms: N1, N3 or O2. But if the uracil was bi-dentate ligand, it will be coordinated by atoms N1 and O2, N3 and O2 or N3 and O4. However, when uracil forms complexes in the form of polymers, coordination occurs through the following atoms: N1 and N3 or N1 and O4.

Preview PDF
Scopus (45)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Sat Jan 25 2020
Journal Name
International Journal Of Research In Pharmaceutical Sciences
Determination of the Dissociation Constants of Metformin from a Second Derivative UV Spectrum
...Show More Authors

An environmentally begnin second derivative spectrometric approach was developed for the estimation of the dissociation constants pKa(s) of metformin, a common anti-diabetic drug.  The ultraviolet spectra of the aqueous solution of metformin were measured at different acidities, then the second derivative of each spectrum was graphed. The overlaid second derivative graphs exhibited two isobestic points at 225.5 nm and 244 nm pointing out to the presence of two dissociation constants for metformin pKa1 and pKa2, respectively. The method was validated by evaluating the reproducibility of the acquired results by comparing the estimated values of the dissociation constants of two different strategies that show excellent matching. As we

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (7)
Scopus Crossref