Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun May 10 2015
Journal Name
Al-academy
Performing processors of view between impressionism & superrealism (A comparative analysis): فريد خالد علوان
...Show More Authors

Addressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 03 2025
Journal Name
Al–bahith Al–a'alami
THE ROLE OF IRAQI SATELLITE TV TOWARDS A CULTURE OF PROTEST AND REMONSTRATION
...Show More Authors

The research dealt with a topic that has been practiced and transmitted news in satellite channels in recent years a lot. That is to say the role of satellite channels in the culture of a protest. In general, this study aims to reach to know the extent of the impact of television, especially the impact of the programs that bear the contents of protest and remonstration on the public; and what can be resulted out of these programs as cognitive, emotional and behavioral effects as a result of the individual's exposure to these programs and their impact from the culture of pretense. In addition to that, the research was interested in explaining the role of Iraqi satellite channels in developing and cultivating such culture; and following up

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2017
Journal Name
International Journal Of Heat And Technology
Optimization of a rectangular pin fin using rectangular perforations with different inclination angles
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation of a Parallel Stress-strength Model Based on the Inverse Kumaraswamy Distribution
...Show More Authors

   

 The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Psychological Stress As A Result of the Spread of the COVID-19 Pandemic
...Show More Authors

Abstract

The pressures of life have become a tangible phenomenon in all societies in varying degrees. This disparity determines several factors, including the nature of societies, the level of their urbanization, the intensity of interaction, the intensity of conflict, and the increasing rate of change in those societies. many people name The modern era in which we live the “era of pressures", where one of the most important of these changes is the “new Coronavirus 19-COVID”, which has spread widely throughout the world, as the pandemic, has affected all aspects of daily life, including the educational and academic process, academic activities have been suspended in universities, which caused sudden change

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Petroleum Research And Studies
A Numerical Study of Tertiary Oil Recovery by Injection of Low-Salinity Water
...Show More Authors

The injection of Low Salinity Water (LSWI) as an Enhanced Oil Recovery (EOR) method has recently attracted a lot of attention. Extensive research has been conducted to investigate and identify the positive effects of LSWI on oil recovery. In order to demonstrate the impact of introducing low salinity water into a reservoir, simulations on the ECLIPSE 100 simulator are being done in this work. To simulate an actual reservoir, an easy static model was made. In order to replicate the effects of injecting low salinity water and normal salinity, or seawater, the reservoir is three-phase with oil, gas, and water. It has one injector and one producer. Five cases were suggested to investigate the effect of low salinity water injection with differen

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Toward a theoretical model of the terrorist personality and differentiation from psychopathic personality
...Show More Authors

The current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical  model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .

View Publication Preview PDF
Publication Date
Tue Feb 27 2024
Journal Name
Mathematical Modelling Of Engineering Problems
Dynamics of a Fractional-Order Prey-Predator Model with Fear Effect and Harvesting
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Nasq
The Impact of Harold Pinter’s Drama Upon the Iraqi Theatre: A Case Study
...Show More Authors

THE IMPACT OF BRITISH THEATER UPON IRAQI DRAMA