Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Objective(s) : This study aimed at evaluating the seroprevalence of anti -HCV and studying the
correlation between hemophilia and risk factors for acquiring HCV such as age , marital status &
occupation among hemophilic patients .
Methodology : 210 hemophilic patients in children welfare teaching hospital/medical city/Baghdad–Iraq
(hemophilia center) were investigated using prepared questionnaire and tested for HCV infection, those
were measuring patient’s age, hemophilia types and severity, marital status, residency and history of
previous HCV infection .
Results : Most hemophilic patients were hemophilia A at severe , hemophilia was at age group 20 – 29
years , the majority of patients were unmarried a
This research aims to know the reality of succession planning in the researched organization and how it occupies the important jobs in the organization and its readiness for sudden and urgent events that lead to the vacancy of these jobs, and the importance of this research is that it is one of the rare Arab and Iraqi studies and research in this field, as it is one of the first researches It deals with the reality of succession planning in light of the retirement law No. (26) of 2019, and the research problem was the absence of consecutive planning programs and the weak preparation of suitable candidates to face sudden and urgent conditions as replacements for current leaders who occupy the leading and key positions in the depar
... Show MoreAllah legislated marriage and made it dwelling, fellowship and mercy between
the two couples, Prophet Moh'd (peace of Allah and blessing be upon him) ordered a
husband to look after his wife, treat her with full charity and make love with here
every kindly. On the other hand, he ordered a wife to obey her husband and respect
him deeply, nevertheless, some obstacles may sometimes be appeared within the life
of their marriage, this may be caused by either a husband or a wife. This problem is
called lifely disobedience (AL-Noshooz).
In the other words, this means that a wife begins to hate her husband, refuse his orders
and not obey him.
In brief, they hate each other which leads to some marks appear in their
m
There is a theoretical controversy in the books of Usul al-Fiqh, in the past and the present, about whether the ruling should be attached to its reason (al-Hikmah), or its apparent and stable cause (al-Illah). Looking at the practical cases of the jurists, we found them sometimes attaching rulings to its reason, and sometimes to its cause, so there is a need to know the factors that affect their choices. By extrapolation, the researcher reached at nine factors that affect referring the ruling to its cause or to its reason in jurisprudential cases.
The file upload is one of the controls of the tool bar of the VisualStodio.NET, but it can’t be used with Ajax technology (It's almost impossible today to be involved in web application design or development and not be aware of Ajax) because the file upload control don’t support Ajax technology that the execution of the instruction is not completed or the (object is not set) message will appear, although the essential need to use this control with Ajax to gain the asynchronous data transfer that supplied by Ajax, because the file upload don’t work without the Postback operation from the client to the server, and the main idea of Ajax technology is working without Postback operation to the server. After the deep resea
... Show MoreHouse 21 fungal isolates fungus to the analyst Albroca output of manufactured blood clot from the Blama human blood showed positive fungi to test analyzes blood clot variation in times where decomposition recorded fungi
With the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.
This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos
... Show MoreWe explore the transform coefficients of fractal and exploit new method to improve the compression capabilities of these schemes. In most of the standard encoder/ decoder systems the quantization/ de-quantization managed as a separate step, here we introduce new way (method) to work (managed) simultaneously. Additional compression is achieved by this method with high image quality as you will see later.