Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Cold plasma is a relatively low temperature gas, so this feature enables us to use cold plasma to treat thermally sensitive materials including polymers and biologic tissues. In this research, the non-thermal plasma system is designed with diameter (3 mm, 10 mm) Argon at atmospheric pressure as well as to be suitable for use in medical and biotechnological applications.
The thermal description of this system was studied and we observed the effect of the diameter of the plasma needle on the plasma, when the plasma needle slot is increased the plasma temperature decrease, as well as the effect of the voltages applied to the temperature of the plasma, where the temperature increasing with increasing the applied voltage . Results showed t
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreThe study included the collection of 75 bronchial wash samples from patients suspected to have lung cancer. These samples were subjected to a diagnostic cytological study to detect the dominant type of lung cancer. It was noticed that 33 patients proved to have a lung cancer out of 75 (44%) of these, 19 cases (57.6%)were diagnosed having Squamus cell carcinoma,7cases (21.21%) showed Adenocarcinoma ,6 cases (18.18%) were having small cell carcinoma while only one case (3.03%)was large cell carcinoma .Nearly 70% of cases were correlated with smokers .Bacteria were isolated from 53 patients in which 33 isolates were associated with the cancer cases while 20 of them from non infected patients. By using different morphological ,biochemical test
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreIn this paper, the human robotic leg which can be represented mathematically by single input-single output (SISO) nonlinear differential model with one degree of freedom, is analyzed and then a simple hybrid neural fuzzy controller is designed to improve the performance of this human robotic leg model. This controller consists from SISO fuzzy proportional derivative (FPD) controller with nine rules summing with single node neural integral derivative (NID) controller with nonlinear function. The Matlab simulation results for nonlinear robotic leg model with the suggested controller showed that the efficiency of this controller when compared with the results of the leg model that is controlled by PI+2D, PD+NID, and F
... Show MoreResearch objective to identify the degree of environmental sustainability values of the student-teacher in the College of Education for Pure Sciences. In this research the methodology of relational descriptive research was adopted, and the research sample consisted of (116) students from the College of Education for Pure Sciences / Ibn Al-Haytham / University of Baghdad From the Department of Chemistry (fourth stage), that is, 54% of the research community were randomly selected. The research tool was prepared, represented by a measure of environmental sustainability values of (20) items, the results of the research showed: The poor degree of environmental sustainability values. The Statistical Portfolio of Social Sciences (SPSS) was adopte
... Show MoreA sensitive film was manufactured Holokravaa using plastic materials the a Akougl substantive Amaid with poly alcohol Funnell addition to sensitive material Daakromat ammonium were obtained registry Qakma to diffraction efficiency of 83%