Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Improved Image Compression Technique Using EZW and SPHIT Algorithms
...Show More Authors

 Uncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Numerical Investigation of Physical Parameters in Cardiac Vessels as a New Medical Support Science for Complex Blood Flow Characteristics
...Show More Authors

This study proposes a mathematical approach and numerical experiment for a simple solution of cardiac blood flow to the heart's blood vessels. A mathematical model of human blood flow through arterial branches was studied and calculated using the Navier-Stokes partial differential equation with finite element analysis (FEA) approach. Furthermore, FEA is applied to the steady flow of two-dimensional viscous liquids through different geometries. The validity of the computational method is determined by comparing numerical experiments with the results of the analysis of different functions. Numerical analysis showed that the highest blood flow velocity of 1.22 cm/s occurred in the center of the vessel which tends to be laminar and is influe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Deep Learning Techniques in the Cancer-Related Medical Domain: A Transfer Deep Learning Ensemble Model for Lung Cancer Prediction
...Show More Authors

Problem: Cancer is regarded as one of the world's deadliest diseases. Machine learning and its new branch (deep learning) algorithms can facilitate the way of dealing with cancer, especially in the field of cancer prevention and detection. Traditional ways of analyzing cancer data have their limits, and cancer data is growing quickly. This makes it possible for deep learning to move forward with its powerful abilities to analyze and process cancer data. Aims: In the current study, a deep-learning medical support system for the prediction of lung cancer is presented. Methods: The study uses three different deep learning models (EfficientNetB3, ResNet50 and ResNet101) with the transfer learning concept. The three models are trained using a

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A Novel Approach to Improving Brain Image Classification Using Mutual Information-Accelerated Singular Value Decomposition
...Show More Authors

View Publication
Scopus (41)
Crossref (41)
Scopus Clarivate Crossref
Publication Date
Sun May 25 2025
Journal Name
International Journal Of Data And Network Science
Multi-objective of wind-driven optimization as feature selection and clustering to enhance text clustering
...Show More Authors

Text Clustering consists of grouping objects of similar categories. The initial centroids influence operation of the system with the potential to become trapped in local optima. The second issue pertains to the impact of a huge number of features on the determination of optimal initial centroids. The problem of dimensionality may be reduced by feature selection. Therefore, Wind Driven Optimization (WDO) was employed as Feature Selection to reduce the unimportant words from the text. In addition, the current study has integrated a novel clustering optimization technique called the WDO (Wasp Swarm Optimization) to effectively determine the most suitable initial centroids. The result showed the new meta-heuristic which is WDO was employed as t

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fusion: Practice And Applications
Optimizing Task Scheduling and Resource Allocation in Computing Environments using Metaheuristic Methods
...Show More Authors

Optimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sat Feb 15 2025
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Physician and Medical Representative Interaction in Iraqi Private Sector: A Qualitative Study
...Show More Authors

Pharmaceutical companies assign a budget for activities and promotions that aim to change the prescription habits of the physicians to choose the most suitable medications for their patients, which will eventually grow their sales. The study's objectives were to explore physicians' and medical representatives' perspectives on the criteria of impactful professional PP and the factors influencing the interaction between physicians and medical representatives. Qualitative in-depth interviews with flexible probing techniques were carried out in 2023. A semi-structured, open-ended interview questionnaire was used to interview physicians and medical representatives (MRs) from different private clinics in several governorates in Iraq. Ten physicia

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Medical evidence in matters of proof between Sharia and law: A model
...Show More Authors

Praise be to God, prayer, and peace be upon the Messenger of Allah and his God and his companions. The field of the judiciary to prove or invalidate some cases in the field of proof of descent and attachment to the plaintiff or exile, and other legal and judicial issues, especially in this era where the spread of previously unknown evidence, such as DNA, which was discovered in 1953, and the genetic fingerprint discovered 1984, blood analysis and a Saliva, sweat, poetry, etc. in the field of forensic evidence, in forensic medicine or medical expertise, it can be used to identify the killer, or verify his identity, using all the evidence in the scene, such as a point of blood or sweat, and the like So, as well as to prove the lineage is u

... Show More
View Publication Preview PDF
Publication Date
Sun May 25 2025
Journal Name
Journal Of Baghdad College Of Dentistry
A study to compare the efficiency of different instrumentation systems for cleaning oval-shaped root canals (An in vitro study)
...Show More Authors

Background: Proper cleaning and shaping of the whole root canal space have been recognized as a real challenge, particularly in oval-shaped canals.This in vitro study was conducted to evaluate and compare the efficiency of different instrumentation systems in removing of dentin debris at three thirds of oval-shaped root canals and to compare the percentage of remaining dentin debris among the three thirds for each instrumentation system. Materials and methods: Fifty freshly extracted human mandibular molars with single straight oval-shaped distal root canals were randomly divided into five groups of ten teeth each. Group One: instrumentation with ProTaper Universal hand instruments, Group Two: instrumentation with ProTaper Universal rotary

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SEASONAL POPULATION ABUNDANCE OF THE CHRYSANTHEMUM APHIDS (HOMOPTERA, APHIDIDAE) IN THE MIDDLE OF IRAQ WITH PICTORIAL KEY TO SPECIES
...Show More Authors

    This study was based on the determination of aphid species that infested Chrysanthemum sp. (Asterales, Asteraceae) in the middle of Iraq; five aphid species belong to subfamily Aphidinae were recorded: Aphis fabae Scopoli, 1763, Aphis gossypii Glover, 1877,  Coloradoa rufomaculata (Wilson, 1908), Macrosiphoniella sanborni (Gillette, 1908) and Myzus persicae (Sulzer, 1776). A. gossypii was the most dominant species throughout the study period while M. persicae  is the lesser species.

    A summary of  the main taxonomic characters is presented here and a pictorial key which was designed to separate aphi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref