Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Objective(s) : This study aimed at evaluating the seroprevalence of anti -HCV and studying the
correlation between hemophilia and risk factors for acquiring HCV such as age , marital status &
occupation among hemophilic patients .
Methodology : 210 hemophilic patients in children welfare teaching hospital/medical city/Baghdad–Iraq
(hemophilia center) were investigated using prepared questionnaire and tested for HCV infection, those
were measuring patient’s age, hemophilia types and severity, marital status, residency and history of
previous HCV infection .
Results : Most hemophilic patients were hemophilia A at severe , hemophilia was at age group 20 – 29
years , the majority of patients were unmarried a
This research aims to know the reality of succession planning in the researched organization and how it occupies the important jobs in the organization and its readiness for sudden and urgent events that lead to the vacancy of these jobs, and the importance of this research is that it is one of the rare Arab and Iraqi studies and research in this field, as it is one of the first researches It deals with the reality of succession planning in light of the retirement law No. (26) of 2019, and the research problem was the absence of consecutive planning programs and the weak preparation of suitable candidates to face sudden and urgent conditions as replacements for current leaders who occupy the leading and key positions in the depar
... Show MoreAbstract: Urinary Tract Infections (UTIs) are the most common bacterial infection in humans and a major cause of morbidity and they are the most common cause of hospital visits worldwide. Proper knowledge in identifying factors associated with urinary tract infection may allow the intervention to easily control of the disease in a timely manner. Therefore, the purpose of the study is determining the prevalence of UTI, diagnosis of causative bacterial agents and identifying the factors associated to the urinary tract infection among patients attending Medical City Hospital in Baghdad, Iraq. A total of 237, morning mid-stream urine samples were collected aseptically and the samples were diagnosed according to the standard methods. I
... Show MoreThis report explores emerging techniques to boost multimedia transfer effectiveness, given the escalating need for improved quality and performance in multimedia interactions. The analysis involves a thorough literature assessment and comparison of present strategies to pinpoint key tendencies and propose novel approaches. The methodology involves examining recent technological enhance ments in video coding standards, quality appraisal methods, and compression tech niques. Specific domains investigated comprise firmware component architectures, 4D indexing structures, and iterative filtering frameworks. The study in addition weighs tradeoffs between video quality, encoding intricacy, and bitrate demands. Key determinations consist of
... Show MoreThe study dealt with measuring the impact of the availability of each of the content elements of the interaction, electronic services, and information on the evaluation of the users of the government website for its effectiveness in terms of the site’s functions and for measuring the site’s ability to present the organization’s tasks to customer groups.
Authority is concerned with measuring the confidence of customers in the content of the site, and in the organization as a whole. Validity is related to measuring the effectiveness of employing the site’s content to achieve the goal of its creation and in communicating with customers. Availability It is for measuring the ease of use of the site. The relevance, which means
... Show MoreThe urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show More