Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Image compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurre
... Show MoreAbstract:
The current research is aimed at analyzing the impact of the dimensions of Job involvement of all of (the enthusiasm, the Devotion, Assimilation ) in the Crystallize organizational Identification across the dimensions of (organizational loyalty, membership, similarities) and was named the Middle East, the Iraqi Investment Bank room to look as the research community of staff adopted in the bank, to be applied to a Random sample of (100) employees working in the said bank, and developed for the purposes of data collection, a questionnaire form included three axes covered (32) paragraph of the measure, which is included adopted Liekrt Quintet for the
... Show MoreThe tax revenues achieved through projects of transition to private sector are regarded as an important source for using in achieving political, economic and social objectives. Since Iraq is heading towards free market economy, new strategies should be adopted to reform the taxation system from by a qualified taxation management office and to activate the taxation policy and to reconsider legislation in relation to the aware of the legible to the importance of disclosure of their taxable real income in order to arrive at contribution of privatization in the taxation revenues for the important role effect on economic activities. In the light of the above, the research is based upon a hypothesis which stipulates that privatization contribu
... Show MoreSome research reports that cognitive grammar (CG) theory has good contributions to teaching English as a foreign language. In this research, the researchers seek to apply this theory and its principles when teaching the simple present tense to Iraqi students who face difficulties in differentiating between the multiple usages of this tense. To achieve this objective, the researchers have conducted an experimental study on a group of 60 Iraqi students in the University of Baghdad, College of Education for Women. Langacker’s (2003) theory has been adopted in the analysis of the cognitive relations to understand the common and different connections of these usages of the simple present. The study has concluded that the cognitive grammar t
... Show MoreLipase enzyme has attracted a lot of attention in recent years because of its diverse biotechnological applications. The present study was conducted to screen germinated seeds of four crops, namely sunflower (Helianthus annuus), flaxor linseed (Linum usitatissimum ), peanut (Arachis hypogaea ) and castor bean (Ricinus communis), for the activity of their lipases. to the study also included the extraction and purification of lipase from the seeds of the most promising crop using different solvents. The results indicated that the maximum enzymatic activity (0.669 U/ml) was obtained when 0.1 M Tris-HCl buffer extract was used after 3 days of seed germination of all the tested species, as compared to the other test solvents
... Show MoreAim The aim of this study is to evaluate the effect of demographic, clinical, and radiographic factors on the duration of surgical extraction of impacted lower third molars. Materials and methods This retrospective study included patients who underwent surgical removal of impacted lower third molars, and the investigated factors were demographic data including age and gender, radiographic data including the impacted tooth angulation and depth of impaction and ramus relation, and clinical data including the state of eruption of the impacted teeth. These factors were evaluated for association with the duration of surgery. Descriptive statistical analysis included percentages and mean ± standard deviation (SD). Student's t-test was used to co
... Show MoreThe main objectives of this research is to extract essential oil from: orange ( citrus sinensis), lemon( citrus limon) and mandarin( citrus reticulata) peels by two methods: steam distillation (SD) and microwave assisted steam distillation (MASD), study the effect of extraction conditions (weight of the sample, extraction time, and microwave power, citrus peel type) on oil yield and compare the results of the two methods, the resulting essential oil was analyzed by Gas Chromatography (GC).
Essential oils are highly concentrated substances used for their flavor and therapeutic or odoriferous properties, in a wide selection of products such as foods, medicines and cosmetics. Extracti
... Show MoreThis work was conducted to study the extraction of pelletierine sulphate from Punica granatum L. roots by liquid membrane techniques. Pelletierine sulphate is used widely in medicine. The general behavior of extraction process indicates that pelletierine conversion increased with increasing the number of stages and the discs rotation speed but high rotation speed was not favored because of the increased risk of droplet formation during the operation. The pH of feed and acceptor solution was also important. The results exhibit that the highest pelletierine conversion was obtained when using two stages, (10 rpm) discs speed of stainless steel discs, (pH=9.5) of feed solution and (pH=2) of acceptor solution in n-decane. Assuming the existen
... Show MoreThis work was conducted to study the extraction of pelletierine sulphate from Punica granatum L. roots by liquid membrane techniques. Pelletierine sulphate is used widely in medicine. The general behavior of extraction process indicates that pelletierine conversion increased with increasing the number of stages and the discs rotation speed but high rotation speed was not favored because of the increased risk of droplet formation during the operation. The pH of feed and acceptor solution was also important. The results exhibit that the highest pelletierine conversion was obtained when using two stages,(10 rpm) discs speed of stainless steel discs,(pH= 9.5) of feed solution and (pH= 2) of acceptor solution in n-decane. Assuming the existence
... Show More