Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
(Evaluation and Mobility) As Two self-Organizing Posts for University Students
...Show More Authors

One of the important goals in the learning process is to be effective learning through the self-direction of the learner , because it has an impact on the effort of learners , it is better to be a learner responsible for learning and independent of the acquisition of knowledge ,

اذ اكدتكثيرAs many have confirmed منFrom الدراساتStudies والادبياتAnd literature انthat فشلالكثير The failure of many منFrom الطلبةStudents فيin a تنظيمgroup المعلوماتthe information ومعالجتهاAnd processed اثناءduring عمليةProcess تعلمهمLearn them لاNo يرجعReturns الىto me انخفاضdrop فيin a درجةDegree ذكائهمTheir intelligence اوor عدمNo

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Approximated Methods for Linear Delay Differential Equations Using Weighted Residual Methods
...Show More Authors

The main work of this paper is devoted to a new technique of constructing approximated solutions for linear delay differential equations using the basis functions power series functions with the aid of Weighted residual methods (collocations method, Galerkin’s method and least square method).

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials & Continua
Takagi–Sugeno Fuzzy Modeling and Control for Effective Robotic Manipulator Motion
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Iron Permeable Reactive Barrier for Removal of Lead from Contaminated Groundwater
...Show More Authors

The possibility of using zero-valent iron as permeable reactive barrier in removing lead from a contaminated groundwater was investigated. In the batch tests, the effects of many parameters such as contact time between adsorbate and adsorbent (0-240 min), initial pH of the solution (4-8), sorbent dosage (1-12 g/100 mL), initial metal concentration (50-250 mg/L), and agitation speed
(0-250 rpm) were studied. The results proved that the best values of these parameters achieve the maximum removal efficiency of Pb+2 (=97%) were 2 hr, 5, 5 g/100 mL, 50 mg/L and 200 rpm respectively. The sorption data of Pb+2 ions on the zero-valent iron have been performed well by Langmuir isotherm model in compared with Freundlich model under the studied

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Iaes International Journal Of Artificial Intelligence
Reduced hardware requirements of deep neural network for breast cancer diagnosis
...Show More Authors

Identifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Purification and activation of the Iraqi bentonite for edible oil Production
...Show More Authors
Abstract<p>Samples of Iraqi bentonitic sediments, representing local montmorillonite brought from Traifawi region near the Syrian border. Mineralogical the samples were characterized as low grade of Ca-smectite, particle size, chemical analysis, XRD, and BET surface area analyses of the samples were carried out to examine the structure of bentonite before and after acid activation. The goal is to prepare a bleaching earth for edible oil production. Iraqi Bentonite was beneficiated and activated by series of physical and chemical steps, using 4N & 6N concentration of hydrochloric acid and at a temperature of 70-80 ° C. Surface area and pore volume of the samples were determined to assess the bleaching power</p> ... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Analytical solutions via coupled Elzaki adomian decomposition method for some applications
...Show More Authors

An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has

... Show More
Scopus (4)
Scopus
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
The study of thermal description for non-thermal plasma needle system
...Show More Authors

Cold plasma is a relatively low temperature gas, so this feature enables us to use cold plasma to treat thermally sensitive materials including polymers and biologic tissues. In this research, the non-thermal plasma system is designed with diameter (3 mm, 10 mm) Argon at atmospheric pressure as well as to be suitable for use in medical and biotechnological applications.
The thermal description of this system was studied and we observed the effect of the diameter of the plasma needle on the plasma, when the plasma needle slot is increased the plasma temperature decrease, as well as the effect of the voltages applied to the temperature of the plasma, where the temperature increasing with increasing the applied voltage . Results showed t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More