Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Inspection In Achieving Banking Compliance: An Applied Study In A Sample o Iraq Banks
...Show More Authors

The Banking Supervision of the most important functions of the Central Bank of Iraq, which he intended to have a strong banking system and a sound and competitive, and exercised control over the banks by inspection bodies to ensure their compliance with the laws, regulations and orders and instructions and the safety of their financial positions.

The research was aimed to release the concept of banking inspection, compliance and problems and obstacles faced by the inspectors, and monitors compliance and down to make recommendations.

Has been reached on a set of theoretical and practical conclusions, including: -

1-confirmed the statistical analysis of the answers to the research sample the importance of the role o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 12 2019
Journal Name
Journal Of The College Of Education For Women
Preparation of A Measurement to the Affirmative Behavior for the Students at the University of Baghdad
...Show More Authors

Self-Assertion is the individual ability to express any emotion well, except the anxiety. The decrease of the individuals asserting behavior makes them face many difficulties that prevent their social adjustment. Moreover it reflexes many negative behavioral and physical cases. The individual, who fails to express his or her negative feelings in required situations, feels with dissatisfaction, loneliness, depression, anxiety, social anxiety, conflict, and psychological disorder.
Accordingly, the importance of this study is represented in studying the self-assertion and studying the university students who reflect the strength of society.
The following are the two aims of the study:
1. Construct an asserting behavior scale.
2.

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Novel Algorithm to Find the Best Solution for Pentagonal Fuzzy Numbers with Linear Programming Problems
...Show More Authors

    Fuzzy numbers are used in various fields such as fuzzy process methods, decision control theory, problems involving decision making, and systematic reasoning. Fuzzy systems, including fuzzy set theory. In this paper, pentagonal fuzzy variables (PFV) are used to formulate linear programming problems (LPP). Here, we will concentrate on an approach to addressing these issues that uses the simplex technique (SM). Linear programming problems (LPP) and linear programming problems (LPP) with pentagonal fuzzy numbers (PFN) are the two basic categories into which we divide these issues. The focus of this paper is to find the optimal solution (OS) for LPP with PFN on the objective function (OF) and right-hand side. New ranking f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 04 2022
Journal Name
Contemporary Nurse
ICU nurses’ safety performance related to respect for safety and management commitment: A cross-sectional study
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Modern Sport
Manufacturing an Innovative Device to Adjust the Distance between Female Fencing Players' Feet
...Show More Authors

تم التطرق في هذا البحث الى دور الذكاء الاصطناعي والتكنولوجيا الحديثة في العملية التدريبية بما يخدم أهدافه والاستفادة منه من خلال المخرجات الجيدة، حيث ان توظيف التكنولوجيا في تدريب رياضة المبارزة يسهل العملية التدريبية على المدرب واللاعب ويساهم في تقليل الجهد المبذول والوقت المستغرق ، وهدفت الدراسة الى التعرف على تأثير الجهاز المصنع في ضبط المسافة بين القدمين لدى عينة البحث  ،استخدم المنهج التجريبي بت

... Show More
Preview PDF
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Economics And Administrative Sciences
Inclusive leadership in the General Secretariat for the Council of Ministers - An analytical research
...Show More Authors

The current research aims to evaluate the level of inclusive leadership within the General Secretariat for the Council of Ministers, and its role in achieving integration in work through the need to improve relationships between different administrative levels, facilitate participation, expression of opinions, and belonging to the organization. In order to achieve the research objective, the descriptive analytical statistical method was chosen using the SPSS V.25 programs, with various statistical methods and measures, including mean, standard deviation, variance coefficient, relative importance, and simple regression, through a questionnaire tool for data collection. The research community included the leadership in the sample of resear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Anatomical Study for Vegetative Organs of Pelargonium graveolens L.'Hér Cultivated in Iraq
...Show More Authors

   The current investigation concluded an  anatomical study of the cultivated species Pelargonium graveolens  L. 'Hér belong to the  Geraniaceae family and which  cultivated as an  ornamental plant, fresh specimen were collected from different region  in  Baghdad ,the study vegetative parts (leaf, stem and petiole) in details ,the upper and lower epidermis of leaf and epidermis of  stem  also studied, ordinary epidermal cells and stomatal complexes studied in term of shapes and  dimensions  ,the result showed that stomatal in leaf and stem is anomocytic type, the cross sections of the vegetative parts  prepared by microtome and free hand sectioning. The tissues of these parts include the number an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 31 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
AN ENHANCED EVOLUTIONARY ALGORITHM WITH LOCAL HEURISTIC APPROACH FOR DETECTING COMMUNITY IN COMPLEX NETWORKS
...Show More Authors

Preview PDF
Scopus (5)
Scopus
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Applying the WaterGEMS Software to Conduct a Comparison of the Darcy-Weisbach and Hazen-Williams Equations for Calculating the Frictional Head Loss in a Selected Pipe Network
...Show More Authors

Darcy-Weisbach (D-W) is a typical resistance equation in pressured flow; however, some academics and engineers prefer Hazen-Williams (H-W) for assessing water distribution networks. The main difference is that the (D-W) friction factor changes with the Reynolds number, while the (H-W) coefficient is a constant value for a certain material. This study uses WaterGEMS CONNECT Edition update 1 to find an empirical relation between the (H-W) and (H-W) equations for two 400 mm and 500 mm pipe systems. The hydraulic model was done, and two scenarios were applied by changing the (H-W) coefficient to show the difference in results of head loss. The results showed a strong relationship between both equations with correlation coefficients of 0.999,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref