Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Iaes International Journal Of Artificial Intelligence
Reduced hardware requirements of deep neural network for breast cancer diagnosis
...Show More Authors

Identifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Design and Construction of Semiconductor Laser Range Finder for Target Designation
...Show More Authors

The aim of this research is to design and construct a semiconductor laser range finder
operating in the near infrared range for ranging and designation. The main part of the range finder is the
transmitter which is a semiconductor laser type GaAs of 0.904 mm wavelength with a beam expander,
and the receiver with its collecting optics. The characteristics of transmitter pulse width were 200ns and
threshold current 10 Amp. and maximum operating current 38 Amp. The repetition rate was set at 660 Hz
and maximum output power about 1 watt. The divergence of the beam was 0.268o. A special computer
code was used for optimum optical design and laser spot size analysis and for calculation of atmosphere
attenuation.

View Publication Preview PDF
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Measurements of HbA1c for Patients with Diabetes Mellitus and Foot Ulceration
...Show More Authors

People with diabetes can develop different foot problems. In the blood stream glucose reacts with hemoglobin to make a glycosylated hemoglobin molecule called hemoglobin A1c or HbA1c, the more glucose in the blood the more hemoglobin A1c will be present in the blood. The HbAlc test is currently one of the best ways to check diabetes to be under control.  The aim of study is to compare between the blood investigations which includes the fasting blood sugar and HbAlC (glycosylated hemoglobin), and to evaluate the benefit of  HbAlc (measurement for diabetic patients with foot ulcer,  to be a good indicator for controlling blood glucose). Sixty patients with type2 diabetes mellitus from the outpatient clinic of Baghdad Teachin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Design features of medicine box packaging for children: منى محمود حسين
...Show More Authors

Graphic design constitutes the human necessity for the design action, so there is no design achievement that is not considered in its founding project and its final realization as a response to a specific necessity. As a result of knowledge, which is the product of experience and is the result of applied science, design is based on observation, study and development, leading to the main goal, which is the utilitarian and aesthetic function that is put into the final consideration of design, and drug packaging design has an important role in all marketing fields, as companies compete with each other to attract the largest number Possible from consumers in a way that guarantees them material profit, and in order to achieve this, it always

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe

... Show More
Crossref (1)
Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design and Study of Fractal Optical Modulator for Infrared Transmitted Signal
...Show More Authors

The optical modulator was designed by using iterated function

systems (IFSs) by IFS Construction Kit program. The modulator was inserted into the optical system using ZEMAX optical design program. In this program, it is assumed that the modulator is made from one of Ø¢ the infrared transmitting materials. Eight materials at room temperature were used in this study; these are IRTRAN materials, Si, and Ge for the range of 3-9 l-lm.

Systems were evaluated and analyzed by using different criteria,

including spot diagram, modulation transfer function, and point spread function. The effect of optical modulator change with the chang of Ø¢ its material results in focusing of functions and frequencies as requ

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Design and Implementation ofICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Mar 22 2016
Journal Name
Brazilian Journal Of Physics
Alpha Decay Preformation Factors for Even–Even 280–316116 Superheavy Isotopes
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref