Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Constant and the Variable in the Aesthetic Image of the Theatrical Direction: حازم عبد المجيد إسماعيل
...Show More Authors

The theatre is one of the main pillars of the human aesthetic thinking as it contains logical explanations for the public human life aspects outside time and environment. When we find that the directive philosophical thinking moving away from the stylistic constants and the virtual laws in taboos that control the accomplishment in terms of the traditional shapes, the employment and the theatrical reception. Some directors moved in post-modernism concepts in a perceptive that liberates thought from its natural context in thinking into an innovative perceptive. The aesthetic images are the basic premise in the prohibition of the philosophical thinking interpretation in order to move the directive thinking and this movement depends on the v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Civil Engineering Journal
The Effect of Oil Contaminated on Collapse Pattern in Gypseous Soil Using Particle Image Velocimetry and Simulation
...Show More Authors

Gypseous soil covers approximately 30% of Iraqi lands and is widely used in geotechnical and construction engineering as it is. The demand for residential complexes has increased, so one of the significant challenges in studying gypsum soil due to its unique behavior is understanding its interaction with foundations, such as strip and square footing. This is because there is a lack of experiments that provide total displacement diagrams or failure envelopes, which are well-considered for non-problematic soil. The aim is to address a comprehensive understanding of the micromechanical properties of dry, saturated, and treated gypseous sandy soils and to analyze the interaction of strip base with this type of soil using particle image

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of innovation and modernization as an approach to strategic change in the efficiency of organizational performance Field research in the Oil Projects Company (SCOP(
...Show More Authors

 

The purpose of this research is to improve the organizational performance of the Oil Projects Company by adopting an approach to strategic change، and finding appropriate solutions to the problems facing the company. The researcher adopted in designing his research by conducting a survey of previous literature that dealt with approaches to strategic change، as the results of the survey showed that most researchers agree on the approach of renewal and modernization، Which formed a starting point for the researcher to identify the extent of the company's management interest in renewal and modernization to improve its level of performance، and the quality of the procedures followed on the ground that is related to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
Judge's Preaching to the Litigants and Witnesses An Applied Doctrinal Study on Judicial Decisions of Saudi Courts
...Show More Authors

Abstract

Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,

This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 18 2022
Journal Name
Sciencescholar Publication
Logical reasoning skills according to Piaget's model for chemistry students in the college of education for pure sciences Ibn al-Haytham in
...Show More Authors

Abstract---The aim of the current research is to identify the level of logical reasoning skills in chemistry students at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham for the academic year (2021-2022). The differences in their level of skills according to the gender variable (males and females) and the academic stages (first- second - third - fourth). The descriptive approach was adopted because it corresponds to the nature of the research objectives. The research sample consisted of (400 )students selected in a relatively random stratified way. The researcher constructed a logical reasoning test, which includes (6) sub-skills , which is (proportional - probabilistic- synthetic- deductive- logic- variable adjustment). The psych

... Show More
Preview PDF
Publication Date
Sat Nov 10 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Instructional Intervention on Medical and Health Information of Patients with Diabetes Mellitus Type II
...Show More Authors

Objective: The objectives of the present study were to evaluate the effectiveness of the instructional intervention
about medical and health knowledge of patients with diabetes mellitus type II.
Methodology: A Quasi- experimental study was carried out in National Center for Diabetes Mellitus/ Almustansria
University, started from 4th January 2012, to 1st April 2012. Non-probability (purposive sample) of (50) diabetes
mellitus type II, who visit National Center for Diabetes Mellitus/ Almustansria University. The study sample is
divided equally into (25) study and (25) control groups. The study group received the instructional intervention.
While the control not exposed to the instructional intervention. The data are coll

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 28 2026
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of thermocycling on microleakage analysis of bulk filled base composite in comparison to incrementally placed nanohybrid composite in class II MOD restorations (An in vitro study)
...Show More Authors

Background: The study aim was to evaluate thermocycling effect on microleakage of occlusal and cervical margins of MOD cavity filled with bulk filled composites in comparison to incrementally placed nanohybrid composite and to evaluate the difference in microleakage between enamel and dentin margins for the three materials groups. Materials and method: Forty eight maxillary first premolars were prepared with MOD cavities. Samples were divided into three groups of sixteen teeth according to material used: Grandio: Grandio. SDR: SDR +Grandio. X-tra: X-tra base + Grandio. Each group was subdivided into two according to be thermocycled or not. After 24 hrs immersion in 2% methylene blue, samples weresectioned and microleakage was estimated. Res

... Show More
View Publication Preview PDF
Publication Date
Sun May 01 2016
Journal Name
International Journal Of Computer Applications
Lossless Image Compression using Adaptive Predictive Coding of Selected Seed Values
...Show More Authors

Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref