Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Integrated reservoir rock typing in carbonate reservoirs is a significant step in reservoir modelling. The key purpose of this study is the identification of integrated rock types in the Sarvak Formation of an Iranian oilfield. In this study, electrofacies (EFAC) analysis of the Sarvak reservoir was done in detail to determine the reservoir quality and rock types of the Sarvak Formation in the studied field. The core data and conventional petrophysical logs were used for rock typing. Some petrophysical logs such as porosity, sonic, neutron, density, and Photo electric factor were applied as input data for electrofacies analysis. Multi-Resolution Graph-Based Clustering was used among six approaches, resulting in four electrofacies af
... Show MoreThe steady state laminar mixed convection and radiation through inclined rectangular duct with an interior circular tube is investigated numerically for a thermally and hydrodynamicaly fully developed flow. The two heat transfer mechanisms of convection and radiation are treated independently and simultaneously. The governing equations which used are continuity, momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C) methods. The finite difference approach with the Line Successive Over-Relaxation (LSOR) method is used to obtain all the computational results. The (B.F.C) method is used to generate the grid of the problem. A computer program (Fortran
... Show MoreIntroduction and Aim: The pro-inflammatory cytokine IL-39, a member of the IL-12 family plays a key role in the inflammatory response by modulating immune cell activity and inflammation. A literature search shows no study undertaken for the effect of IL-39's on arthritis so far. Hence, the purpose of this study was to investigate the role of IL-39 in rheumatoid arthritis. Materials and Methods: This study involved 80 patients with rheumatoid arthritis registered at the Rheumatology Clinic at Baghdad teaching hospital. The patients were divided into three groups based on treatments received. Group 1 included patients who were not on any treatment for arthritis, Group 2 with patients on hydroxychloroquine and or prednisone treatment,
... Show MoreKE Sharquie, MM Al-Waiz, AA Al-Nuaimy, Saudi medical journal, 2005 - Cited by 8
Background: The bond strength of the root canal sealers to dentin seems to be a very important property for maintaining the integrity and the seal of root canal filling. The aim of this study was to evaluate the shear bond strength of four different obturation systems using push-out test. Materials and methods: Forty straight palatal roots of the maxillary first molars teeth were used in this study, these roots were instrumented using crown down technique and ProTaper system, instrumentation were done with copious irrigation of 2.5% sodium hypochlorite and 17% buffered solution of EDTA was used as final irrigant followed by distilled water, roots were randomly divided into four groups according to the obturation system (ten teeth for each g
... Show MoreThis work is licensed under a Creative Commons Attribution 4.0 International License. Abstract This study examines the working capital management
Business Ethics play a major role in explaining the behavior of those interested in the management of tourism enterprises in the field of management gains, which sometimes turn to manipulation in the specification of the service of tourism and influence in the technical characteristics at the expense of the brand and market share, as well as misleading beneficiaries about the fact that the performance of the service of tourism, may depend activities tourist dramatically when submitting and sharing various services on the types of mutual relations the framework for moral distinct, in interaction or direct contact between producers of tourism services and tourists or their beneficiaries, in order to provide comfort and recreation a
... Show More