Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Some children are suffering from introversion in kindergartens , so it must be confront and obviated by specialists because it will inevitably lead to unsatisfactory results reflect negatively on the individual and the community together . And the introvert child is a miserable child incapable of social interaction or give - and - take with colleagues , lack of integration of the child to life leads to the obstruction of participation with his peers in various activities. Introversion causes a real emotional deficit to the children of kindergartens which limits of possibility of their intellectual development and mental growth and that because of their isolation and poor focus in education
... Show MoreIn this paper, variable gain nonlinear PD and PI fuzzy logic controllers are designed and the effect of the variable gain characteristic of these controllers is analyzed to show its contribution in enhancing the performance of the closed loop system over a conventional linear PID controller. Simulation results and time domain performance characteristics show how these fuzzy controllers outperform the conventional PID controller when used to control a nonlinear plant and a plant that has time delay.
A case–control study (80 patients with chronic hepatitis B virus [HBV] infection and 96 controls) was performed to evaluate the association of an IL12A gene variant (rs582537 A/C/G) with HBV infection. Allele G showed a signifcantly lower frequency in patients compared to controls (31.2 vs. 46.9%; probability [p]=0.009; corrected p [pc]=0.027) and was associated with a lower risk of HBV infection (odds ratio [OR]=0.49; 95% confdence interval [CI]=0.29–0.83). A similar lower risk was associated with genotypes CG (17.5 vs. 29.2; OR=0.25; 95% CI=0.08–0.81; p=0.02) and GG (10.0 vs. 16.7; OR=0.25; 95% CI=0.07–0.91; p=0.036), but the pc value was not signifcant (0.12 and 0.126, respec‑ tively). Serum IL35 levels showed signifcant difere
... Show More‘Ode to a Nightingale’(1819) is a typical poem of a Romantic poet like John Keats, but
‘The Nightingale’(1798) is an uncharacteristic poem of a Romantic poet like Coleridge.
The paper proposes a comparison between Coleridge’s ‘The Nightingale’ and Keats’
‘Ode to a Nightingale’.Coleridge’s poem diverges from the Romantic norm; it carries some
characteristics new to Romantic poetry like the realistic and objective portrayals of nature and
the nightingale, while Keats’ poem adhere to the characteristics of Romantic poetry; it
portrays nature and the nightingale subjectively and unrealistically. Coleridge’s poem is very
much influenced by the scientific approaches to environment, and natural his
A general velocity profile for a laminar flow over a flat plate with zero incidence is obtained by employing a new boundary condition to the other available boundary conditions. The general velocity profile is mathematically simple and nearest to the exact solution. Also other related values, boundary layer thickness, displacement thickness, momentum thickness and coefficient of friction are nearest to the exact solution compared with other corresponding values for other researchers.
A recently reported Nile red (NR) dye conjugated with benzothiadiazole species paves the way for the development of novel organic-based sensitizers used in solar cells whose structures are susceptible to modifications. Thus, six novel NR structures were derived from two previously developed structures in laboratories. In this study, density functional theory (DFT) calculations and time-dependent DFT (TD-DFT) were used to determine the optoelectronic properties of the NR-derived moieties such as absorption spectra. Various linkers were investigated in an attempt to understand the impact of π-linkers on the optoelectronic properties. According to the findings, the presence of furan species led to the planarity of the molecule and a reduction
... Show MoreA general velocity profile for a laminar flow over a flat plate with zero incidence is obtained by employing a new boundary condition to the other available boundary conditions. The general velocity profile is mathematically simple and nearest to the exact solution. Also other related values, boundary layer thickness, displacement thickness, momentum thickness and coefficient of friction are nearest to the exact solution compared with other corresponding values for other researchers.
The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreThe child realize that the meals time provide golden opportunities to get the attention the child needs. However, many difficulties that may appear about eating food can be avoided, if the family used the right way in dealing with this problem. The study aims, in this case, at searching for the reasons that lies behind the child's obstinacy in eating his food and the attempt to study some variables that is related to the research topic.
The results are summed up as follows:
- The number of the sample children is 3 of both sexes between the ages of 3 to 6 years