Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for
... Show MoreIn the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show MoreThis work is concerned with building a three-dimensional (3D) ab-initio models that is capable of predicting the thermal distribution of laser direct joining processes between Polymethylmethacrylate (PMMA) and stainless steel 304(st.st.304). ANSYS® simulation based on finite element analysis (FEA) was implemented for materials joining in two modes; laser transmission joining (LTJ) and conduction joining (CJ). ANSYS® simulator was used to explore the thermal environment of the joints during joining (heating time) and after joining (cooling time). For both modes, the investigation is carried out when the laser spot is at the middle of the joint width, at 15 mm from the commencement point (joint edge) at traveling time of 3.75 s. Process par
... Show MoreZiegler and Nichols proposed the well-known Ziegler-Nichols method to tune the coefficients of PID controller. This tuning method is simple and gives fixed values for the coefficients which make PID controller have weak adaptabilities for the model parameters variation and changing in operating conditions. In order to achieve adaptive controller, the Neural Network (NN) self-tuning PID control is proposed in this paper which combines conventional PID controller and Neural Network learning capabilities. The proportional, integral and derivative (KP, KI, KD) gains are self tuned on-line by the NN output which is obtained due to the error value on the desired output of the system under control. The conventio
... Show MoreSamples of Iraqi bentonitic sediments, representing local montmorillonite brought from Traifawi region near the Syrian border. Mineralogical the samples were characterized as low grade of Ca-smectite, particle size, chemical analysis, XRD, and BET surface area analyses of the samples were carried out to examine the structure of bentonite before and after acid activation. The goal is to prepare a bleaching earth for edible oil production. Iraqi Bentonite was beneficiated and activated by series of physical and chemical steps, using 4N & 6N concentration of hydrochloric acid and at a temperature of 70-80 ° C. Surface area and pore volume of the samples were determined to assess the bleaching power
Solar hydrogen line emission has been observed at the frequency of 1.42 GHz (21 cm wavelength) with 3m radio telescope installed inside the University of Baghdad campus. Several measurements related to the sun have been conducted and computed from the radio telescope spectrometer. These measurements cover the solar brightness temperature, antenna temperature, solar radio flux, and the antenna gain of the radio telescope. The results demonstrate that the maximum antenna temperature, solar brightness temperature, and solar flux density are found to be 970 K, 49600K, and 70 SFU respectively. These results show perfect correlation with recent published studies.
In this paper, a methodology is presented for determining the stress and strain in structural concrete sections, also, for estimating the ultimate combination of axial forces and bending moments that produce failure. The structural concrete member may have a cross-section with an arbitrary configuration, the concrete region may consist of a set of subregions having different characteristics (i.e., different grades of concretes, or initially identical, but working with different stress-strain diagrams due to the effect of indirect reinforcement or the effect of confinement, etc.). This methodology is considering the tensile strain softening and tension stiffening of concrete in additio
Shatt Al-Hilla was considered one of the important branches of Euphrates River that supplies irrigation water to millions of dunams of planted areas. It is important to control the velocity and water level along the river to maintain the required level for easily diverting water to the branches located along the river. So, in this research, a numerical model was developed to simulate the gradually varied unsteady flow in Shatt AL-Hilla. The present study aims to solve the continuity and momentum (Saint-Venant) equations numerically to predict the hydraulic characteristics in the river using Galerkin finite element method. A computer program was designed and built using the programming language FORTRAN-77. Fifty kilometers was consid
... Show More
