Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Dec 15 2022
Journal Name
Al Kut Journal Of Economics And Administrative Sciences
The relationship of demographic diversity to institutional effectiveness An analytical study of a sample of workers in public organizations in Iraq
...Show More Authors

Diversity has become one of the required phenomena to be available within public organizations, in light of the changes taking place in the global and international environment and in various fields. Therefore, it was imperative to study the impact of this phenomenon in various institutions, especially public ones, in most developing countries, including Iraq. The current research aims to analyze the relationship between The demographic diversity and institutional effectiveness of a sample of workers in public institutions included (500) respondents. The questionnaires were distributed to them randomly. Diversity is considered an independent variable and institutional effectiveness a dependent variable. The researcher used interview tools a

... Show More
Preview PDF
Publication Date
Fri Feb 14 2020
Journal Name
Progress In Industrial Ecology, An International Journal
3D image reconstruction from its 2D projection - a simulation study
...Show More Authors

A simulation study of using 2D tomography to reconstruction a 3D object is presented. The 2D Radon transform is used to create a 2D projection for each slice of the 3D object at different heights. The 2D back-projection and the Fourier slice theorem methods are used to reconstruction each 2D projection slice of the 3D object. The results showed the ability of the Fourier slice theorem method to reconstruct the general shape of the body with its internal structure, unlike the 2D Radon method, which was able to reconstruct the general shape of the body only because of the blurring artefact, Beside that the Fourier slice theorem could not remove all blurring artefact, therefore, this research, suggested the threshold technique to eliminate the

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Research In Medical And Dental Science
The Efficacy of 4% Articaine Infiltration Anesthesia in the Extraction of Mandibular Molars: A Randomized Controlled Study
...Show More Authors

Introduction: Articaine was developed in 1969, with reported advantages which are increased potency, increased duration of its anesthetic effect and superior diffusion through bony tissue. The effectiveness of using 4% articaine infiltration for extraction of mandibular molar teeth in comparison to 2% lidocaine inferior alveolar nerve block is not settled yet. Aim: The aim of this study was to evaluate the effectiveness of using 4% articaine infiltration for extraction of mandibular molars by comparing it to the use of 2% lidocaine inferior alveolar nerve block in terms of success, the volume of local anesthetic agents and the pain experienced during the procedure. Materials and methods: A prospective randomized controlled study included

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
A study of anti fungal activity of a combination of essential oils from medical herbs against water molds
...Show More Authors

The aim of this study is to evaluate the anti fungal activity of a combination of essential oils against water molds. HPLC analysis was done to evaluate the quantity and quality of the active compounds in this combination which extracted from three herbs( Peppermint Menthapiperita ,Thyme Thymusvulgaris, Common sage Salvia officinalis L.) and the active compounds are Camphor,Menthol,,Thujone and Thymol with different concentrations. In this study (MIC) , (MFC) were measured and (LD50) determined after 48,96 h from fingerlings treatment of common carp in aquariums .The results of (MIC) were 0.025µl/ml for Aphanomyces sp. and 0.015µl/ml for both Achlya sp. and Fusariumsolani which showed significant differences(p<0.05) from Malachite gre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Diversity of Temporal Workings in the Narrative of the Feature Film: عباس فاضل عبد
...Show More Authors

  Time represented a significant element in building any film story, despite its inability to express itself, but by employing the rest of the elements of the cinematic mediator language to express it. Time factor is present and manifested in all the details of the picture, and the more important is its presence in the event narration process. The narration totally depends on temporal structure in which it appears, which makes time a dominating element in the development of the narrative shapes and patterns. The narrative propositions have come to take new workings that time streams appeared that manipulate the time structure, reversing it, stopping it or making it fluctuate between the three levels of time, or repeating it or make

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Exploring Important Factors in Predicting Heart Disease Based on Ensemble- Extra Feature Selection Approach
...Show More Authors

Heart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF