Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
The voice had a special place in the writting of the Andalusian poet (Ibn al-Abar ) , which aroused my attention because of the sonic capacity of the lettering inside the poetic at Ibn al-Abar poems . So Istudied the qualities of the lettering , structures and their exits . Scientists have not been able to determine the musical from the nonmusical sound , but we find the innate ability of Ibn al-Abar , which was able to determine this by using the lettering the right places and to revival the life to reflect the moments of his life , therefore came votes to express his purposes of praise and pride Etc. The poet Ibn al-Abar could exploit the lettering features in the effect of bilateral – static and moving and its ability to e
... Show MoreBackground: Debonding orthodontic brackets and removal of residual bonding material from the enamel surface include critical steps that may cause enamel damage. The aim of the present study was to evaluate and compare the site of bond failure and enamel surface damage after debonding of three types of esthetic brackets (composite, ceramic, sapphire) bonded with light cure composite and resin-modified glass ionomer adhesive. Materials and methods: Seventy two maxillary premolars teeth were divided into three groups each group consisted of 24 teeth according to the type of brackets. Each group was subdivided into two subgroups (12 teeth for each) according to the bonding material that was used. After 7 days of bonding procedure, the brackets
... Show MoreIn this paper, we establish the conditions of the occurrence of the local bifurcations, such as saddle node, transcritical and pitchfork, of all equilibrium points of an eco-epidemiological model consisting of a prey-predator model with SI (susceptible-infected) epidemic diseases in prey population only and a refuge-stage structure in the predators. It is observed that there is a transcritical bifurcation near the axial and free predator equilibrium points, near disease-free equilibrium point is a saddle-node bifurcation and near positive (coexistence) equilibrium point is a saddle-node bifurcation, a transcritical bifurcation and a pitchfork bifurcation. Further investigations for Hopf bifurcation near coexistence equilibrium point
... Show MoreJatropha L. is an exotic genus to Iraq and it has been cultivated in gardens for ornamental purposes because of the shiny red color of the flowers. The plant adapted to environmental conditions and succeeded in growing and blooming, which is why the species was interested to study. The species Jatropha integerrima Jacq. was examined and diagnosed for the first time in Iraq. Morphological and anatomical characteristics for leaves (considering that the variations are the most reliable and taxonomically important) were provided. The Phytochemical screening showed the presence of alkaloids, flavonoids, terpenes, tannins and saponins. The qualitative analysis by TLC indicated the presence of alkaloids and flavonoid that was detected by specia
... Show MoreThis paper reports a numerical study of flow behaviors and natural convection heat transfer characteristics in an inclined open-ended square cavity filled with air. The cavity is formed by adiabatic top and bottom walls and partially heated vertical wall facing the opening. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. A computer program to solve mathematical model has been developed and written as a code for MATLAB software. Results in the form of streamlines, isotherms, and average Nusselt number, are obtained for a wide range of Rayleigh numbers 103-106 with Prandtl number 0.71
... Show MoreThe Islamic Banks including the Iraqi ones are often resorted to support their governance frameworks in order to improve its competitiveness in their communities. Where, those banks are looking for activities that enhance their governance; one of these activities is Shariah Audit that provided the auditing capabilities to face of developmental challenges and increase competitiveness. Therefore, the content of this paper, discusses know-how to use the Shariah Audit and its references in support of the Shariah Governance in the Iraqi Isla
... Show MoreIn this paper, a theoretical study of the energy spectra and the heat capacity of one electron quantum dot with Gaussian Confinement in an external magnetic field are presented. Using the exact diagonalization technique, the Hamiltonian of the Gaussian Quantum Dot (GQD) including the electron spin is solved. All the elements in the energy matrix are found in closed form. The eigenenergies of the electron were displayed as a function of magnetic field, Gaussian confinement potential depth and quantum dot size. Explanations to the behavior of the quantum dot heat capacity curve, as a function of external applied magnetic field and temperature, are presented.
Numerical Investigation was done for steady state laminar mixed convection and thermally and hydrodynamic fully developed flow through horizontal rectangular duct including circular core with two cases of time periodic boundary condition, first case on the rectangular wall while keeping core wall constant and other on both the rectangular duct and core walls. The used governing equations are continuity momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C.) methods. The Finite Difference approach with the Line Successive Over Relaxation (LSOR) method is used to obtain all the computational results the (B.F.C.) method is used to generate th
... Show More