Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
An Experimental Analysis of Embankment on Stone Columns
...Show More Authors

When embankment is constructed on very soft soil, special construction methods are adopted. One of the techniques is a piled embankment. Piled (stone columns) embankments provide an economic and effective solution to the problem of constructing embankments over soft soils. This method can reduce settlements, construction time and cost. Stone columns provide an effective improvement method for soft soils under light structures such as rail or road embankments. The present work investigates the behavior of the embankment models resting on soft soil reinforced with stone columns. Model tests were performed with different spacing distances between stone columns and two lengths to diameter ratios of the stone columns, in addition to different

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Apr 03 2025
Journal Name
Aip Conference Proceedings
The left-right derivation of an AT-algebra
...Show More Authors

This work aims to introduce the concepts of left and right derivations in an AT-algebra and discuss some interesting theorems of these concepts. Also, a fuzzy derivation of an AT-subalgebra, a fuzzy right (left) derivation ideal, a fuzzy derivation of AT-subalgebra, and a fuzzy right (left) derivation ideal are studied. Finally, a level derivation of AT-algebras is defined and some propositions are achieved.

Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Serum total sialic acid levels as an indicator
...Show More Authors

Forty patients with acute lymphoblastic leukemia(ALL) were tested for the serum levels of total sialic acid(TSA) and the immunoglobulins before and after treatnemnt with six diffrent chemotherapy protocols while significantly

View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
Jawabu suualat an qawli taqabbalalaaho wal musafahata bahdassalawat
...Show More Authors

This research deals with a jurisprudential manuscript with study and investigation by Sheikh Ibrahim Al-Kurani, one of the prominent Kurdish scholars in the eleventh century. Some claim that it is heresy in the religion, and that the Prophet, may God bless him and grant him peace, did not do it.

The Sheikh responded to that, confirming its permissibility, and that it does not fall within the innovated matters, based on its permissibility on the two Eids and other religious occasions, and also that the issue of supplication with acceptance was legislated for the sake of worship without specifying it to one without the other, and it is known that prayer is one of the greatest acts of worship. supplication that fasting is accepted;

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
PART 2 An Experiment on the Box plot
...Show More Authors

Abstract

These experiments seek to investigate the effects of the fixed variations to the basic box plot on subjects' judgments of the box lengths. The study consists of two experiments, were constructed as an extension to the experiments carried out previously by Hussin, M.M. (1989, 2006).  Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box length and also varying with respect to other elements such as, box width or whisker length. When he (1989) suggested in the future research points (1, 2), the changing length of the st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Compression of an ECG Signal Using Mixed Transforms
...Show More Authors

Electrocardiogram (ECG) is an important physiological signal for cardiac disease diagnosis. With the increasing use of modern electrocardiogram monitoring devices that generate vast amount of data requiring huge storage capacity. In order to decrease storage costs or make ECG signals suitable and ready for transmission through common communication channels, the ECG data
volume must be reduced. So an effective data compression method is required. This paper presents an efficient technique for the compression of ECG signals. In this technique, different transforms have been used to compress the ECG signals. At first, a 1-D ECG data was segmented and aligned to a 2-D data array, then 2-D mixed transform was implemented to compress the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
An edge detection algorithm matching visual contour perception
...Show More Authors

For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.

View Publication Preview PDF
Publication Date
Wed Oct 07 2020
Journal Name
Journal Of Interdisciplinary Mathematics
Discrete an SIS model with immigrants and treatment
...Show More Authors

In this paper, a discrete SIS epidemic model with immigrant and treatment effects is proposed. Stability analysis of the endemic equilibria and disease-free is presented. Numerical simulations are conformed the theoretical results, and it is illustrated how the immigrants, as well as treatment effects, change current model behavior

View Publication Preview PDF
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
University Youth Attitudes towards Electronic Advertisements and their Relationship to the Behavior of the Consumer A Field Study of a Sample of Students of the College of Mass-Communication / University of Baghdad as a Model
...Show More Authors

This research aims at identifying the communicative habits and content reflections on the communication process, especially the young audience which is one of the main group for whom the announcements are made. Because young people face life with passion and aspiration making them respond to each effect used by the media in the design of the advertising using all the effective techniques, attractive methods for young children like depending on drama, technical tricks, music and logos easily to be remembered and responded to the desires of the young in their entertainment. This research also aims at identifying the impact of the internet as a channel of commercial advertising on the purchasing behavior of young people at the universities

... Show More
View Publication
Crossref