Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (138)
Crossref (114)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Ieee Access
Fuzzy-Based Ensemble Feature Selection for Automated Estimation of Speaker Height and Age Using Vocal Characteristics
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Preparation and identification of oxidatin derivaties for Salts and acids of bile for medical uses
...Show More Authors

The purified prepared compounds were identified through different methods of identification i.e, I.R, UV-vi^ble-spectroscopy in addition to (coloured tests) Calculation of the sum of OH groups. TLC techniques were also used to test the purity and the speed ofthe rate of flow (RF).

View Publication Preview PDF
Publication Date
Thu Jan 11 2024
Journal Name
Eximia
Using an educational method according to special exercises to perform the skill of bow and develop flexibility for cub wrestlers in Iraq
...Show More Authors

creating unique exercises utilizing a teaching approach that works with the research sample, determining how special exercises affect the development of torso flexibility, and determining how special exercises affect the development of bow ability. Activate the search The results of the pre- and post-tests for the control and experimental research groups show a statistically significant association that is favoring the post-test in the development of bow skill performance Using the experimental technique, the researcher set up one group and gave them two tests (pre and post) based on scientific theories that made sense for the topic at hand. Forty adolescent wrestlers from the Adhamiya Club in the Baghdad Governorate were recognized

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
PREPARATION OF NITRATION DERIVATIVES OF BILE SALTS AND ACIDS FOR MEDICAL USE
...Show More Authors

The derivatives formed after the successive acetylation, esterification and nitration reactions to cholic, deoxycholic, and taurocholic acids were identified to be of the following general strucure: Colt, Where RI=NO3, OH, 0=, or CH3COO. R2=H, NO3, OH, 0-=, or CH3COO. R3=H, NO3,01-1, 0=, or CH3COO. R4=OH, NH(CH2)2S03Na, NH(CH2)2S03H, or OMe. By using U.V-visible and I.R spectrophotometry . The number of hydroxyl groups was determined, purity was checked from T.L.C, Most of these derivatives will find pharmaceutical application.

View Publication Preview PDF
Publication Date
Wed Aug 20 2025
Journal Name
Artificial Intelligence Review
A comprehensive review on key technologies toward smart healthcare systems based IoT: technical aspects, challenges and future directions
...Show More Authors
Abstract<p>The unexpected death of humans due to a lack of medical care is a serious problem. Additionally, the number of elderly people requiring continuous care is increasing. A global aging population poses a challenge to the sustainability of conventional healthcare systems for the future. Simultaneously, recent years have seen remarkable progress in the Internet of Things (IoT) and communication technologies, alongside the growing importance of artificial intelligence (AI) explainability and information fusion. Therefore, developing smart healthcare systems based on IoT and advanced technologies is crucial. This would open up new possibilities for efficient and intelligent medical system</p> ... Show More
View Publication
Scopus (23)
Crossref (17)
Scopus Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Cogent Engineering
Content-based image retrieval: A review of recent trends
...Show More Authors

View Publication
Scopus (135)
Crossref (127)
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Soft Computing And Computer Applications
Enhancing Image Classification Using a Convolutional Neural Network Model
...Show More Authors

In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.

... Show More
View Publication
Crossref (2)
Crossref