Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Objectives: The study aims to evaluate the application of monitoring indicators for maternal, newborn and
child health through the evaluation of impact and coverage health indicators and to evaluate the usefulness of the
application of these indicators at sub primary health care centers in Baghdad City.
Methodology: A descriptive comparative design, which is using the evaluation approach, has been steered at
Sub Primary Health Centers of Baghdad City in order to evaluate the application; impact and coverage, and the
usefulness of monitoring indicators for maternal, newborn and child health from December 4th 2017 to April 29th
2018. A multistage, "non-probability" convenient, sample is selected for the present study. A t
The research aims to study and definition of the concept of creative accounting and motives adopted by the management of companies to achieve their own goals and their impact on the reliability of the financial statements and the tax settling accounts and whether that tax administration is able to detect and limit the creative accounting practices and impose legal sanctions deterrent against companies The research has come to a set of conclusions, including:
- The administration motives in the use of creative accounting methods, some internal motives related to the interests of the administration in maximizing profits to increase incentives and rewards, others are external, such as the impact on stock prices or reduce the am
The present investigation aims to determine the effects of aflatoxin B1 (AFB1) on biotransformation and antioxidant genes and the protective effects of curcumin, present in turmeric (Curcuma longa) powder (TMP). Specifically, the study included four groups of albino mice were fed for 30 days on diet Group I: Control, Group II: animals fed on the conventional basal diet supplemented with 0.5% food grade TMP that supplied 74 mg/kg total curcuminoids. Group III contained animals reared on conventional basal diet supplemented with 1.0 ppm AFB1 supplied by ground aflatoxin culture material (760 ppm AFB1). Finally, Group IV comprised of albino mice fed with basal diet supplemented with 1.0 ppm AFB1 and 0.5% TMP that supplied 74 mg/kg of the
... Show MoreBackground: White-spot lesion is one of the problems associated with the fixed orthodontic treatment. The aims of this in-vitro study were to investigate enamel damage depth on adhesive removal when the adhesive were surrounded by sound, demineralized or demineralized enamel that had been re-mineralized prior to adhesive removal using 10% Nano-Hydroxy apatite and to determine the effect of three different adhesive removal techniques. Materials and methods: Composite resin adhesive (3M Unitek) was bonded to 60 human upper premolars teeth which were randomly divided in to three groups each containing ten sound teeth and ten teeth with demineralized and re-mineralized lesions adjacent to the adhesive. A window of 2 mm was prepared on the bucca
... Show MoreThis research aims to analyze the intellectual and civilizational regression that afflicted Iraqi and Arab society due to political and religious tyranny and internal conflicts, which was reflected in the deterioration of human rights values and the absence of equality and justice in dealing with the other religiously, which affected the reluctance of members of religious groups to interact with their national societies and then migrate to Outside, which contributed to a double loss, in terms of the loss of these societies by productive and effective national competencies, and in terms of distorting the image of Islam. The research stressed that the first treatments of this phenomenon are the consolidation of the values of citize
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
This study aims to identify the role of forensic accounting in resolving banking disputes in the Iraqi environment, and to achieve this goal, the fiel
d survey method was used, as it is the most appropriate for studying the phenomenon in question and achieving its objectives. A sample of (50) male and female employees was selected, distributed among five banks listed on the Iraq Stock Exchange in the Baghdad governorate. The questionnaire tool prepared for this purpose was applied to them, which consisted of two main axes. The first axis included paragraphs of questions related to the importance of forensic accounting. The second axis relates to disputes At the end of the research, we reached a set of conclusions, the most import
... Show MoreDocumentary Credit passes through many practical phases starting from Opening credit and matching documents and payment of the amount of credit……etc. It is worthy to mention that there are several aspects that are varied and differed from Bank to another one which can offer Competitive Advantage for the bank …This will be shown in this research.
For the purpose of achieving the objective of this research within the theoretical aspect, the researcher had seen and briefed several books and researches which are mainly related to the subject of the research.
As for the practical aspect, has included Questionnaire which included many questions that are fit and suitable to the hypotheses.
Research sample has
... Show MoreArtificial neural networks usage, as a developed technique, increased in many fields such as Auditing business. Contemporary auditor should cope with the challenges of the technology evolution in the business environment by using computerized techniques such as Artificial neural networks, This research is the first work made in the field of modern techniques of the artificial neural networks in the field of auditing; it is made by using thesample of neural networks as a sample of the artificial multi-layer Back Propagation neural networks in the field of detecting fundamental mistakes of the financial statements when making auditing. The research objectives at offering a methodology for the application of theartificial neural networks wi
... Show More