Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Mar 10 2022
Journal Name
Oral Surgery
Evaluation of buffered local anaesthesia in dental extraction: A randomized controlled study
...Show More Authors

Buffering of Local anaesthesia (LA) has been suggested as a mechanism to improve injection comfort and hasten the onset of anaesthesia. Aim This study aimed to evaluate the effectiveness of buffered LA in the extraction of maxillary premolars and molars. Materials and Methods This randomized controlled study included 100 patients who were indicated for extraction of maxillary posterior teeth, they were randomly divided into two groups; a study group that received infiltration of buffered 2% lidocaine hydrochloride with 1:80,000 epinephrine LA, and a control group that received non-buffered 2% lidocaine hydrochloride with 1:80,000 epinephrine LA. The buffering was performed using the Onset® LA buffering system (Onpharma®). The outcome va

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Thu Mar 22 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Assessment of medical solid waste generation rates for teaching hospitals in Baghdad city
...Show More Authors

Publication Date
Wed Jun 28 2023
Journal Name
Internet Technology Letters,
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on

... Show More
View Publication
Scopus (8)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Jan 02 2025
Journal Name
مجلة كلية القانون للعلوم القانونية والسياسية
Employment of Chinese Cyber Power in Regional Conflict Management Strategies The Case of Conflict with Japan After 2014
...Show More Authors

Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un

... Show More
View Publication
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Different Resolution Merging Methods For Environmental Areas Extraction
...Show More Authors

The usage of remote sensing techniques in managing and monitoring the environmental areas is increasing due to the improvement of the sensors used in the observation satellites around the earth. Resolution merge process is used to combine high resolution one band image with another one that have low resolution multi bands image to produce one image that is high in both spatial and spectral resolution. In this work different merging methods were tested to evaluate their enhancement capabilities to extract different environmental areas; Principle component analysis (PCA), Brovey, modified (Intensity, Hue ,Saturation) method and High Pass Filter methods were tested and subjected to visual and statistical comparison for evaluation. Both visu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Isolation of Some Microorganisms from Bar Soaps and Liquid Soaps in Hospital Environments
...Show More Authors

This study was designed to determine the colonization of the in-use hand washing soaps in hospital settings. It is a comparative cross-sectional research in a surgical specialties and Baghdad teaching hospital in Baghdad, Iraq. Swabs from surfaces of bar soaps and from liquid soaps via their applicator tips; at the sinks of toilets of hospital staff and working rooms of the wards were taken in January 2008. Conventional microbiologic methods were used for culture of the swabs and identification of the isolates. Colonization was detected 60% and 15.9% in bars and liquid forms respectively. And this lead to the conclusion that bar soaps could be colonized with microorganisms excessively. Liquid hand washing soaps are more appropriate in ho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
An Analysis of Stress Distribution in a Spline Shaft Subjected to Cycilc Impulsive Load
...Show More Authors

In this paper the effect of engagement length, number of teeth, amount of applied load, wave propagation time, number of cycles, and initial crack length on the principal stress distribution, velocity of crack propagation, and cyclic crack growth rate in a spline coupling subjected to cyclic torsional impact have been investigated analytically and experimentally. It was found that the stresses induced due to cyclic impact loading are higher than the stresses induced due to impact loading with high percentage depends on the number of cycles and total loading time. Also increasing the engagement length and the number of teeth reduces the principal stresses (40%) and
(25%) respectively for increasing the engagement length from (0.15 to 0

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Arab Food's Security
...Show More Authors

Arab Food's Security

View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Using VGG Models with Intermediate Layer Feature Maps for Static Hand Gesture Recognition
...Show More Authors

A hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jan 19 2026
Journal Name
American Journal Of Alzheimer's Disease & Other Dementias®
Comparison Study of Different Feature Selection Techniques for the Diagnosis of Alzheimer’s Disease
...Show More Authors

Objective : Alzheimer’s disease (AD) continues to be a major challenge because handling high-dimensional data is time-consuming and expensive due to its complexity. A large feature space often increases computational costs and reduces model interpretability. This study addresses this problem by evaluating and comparing multiple feature selection techniques to identify the most informative biomarkers for AD diagnosis.

Methods : Our study used data from the Alzheimer's Disease Neuroimaging Initiative (ADNI) to implement and test three feature selection a

... Show More
View Publication
Scopus Crossref