Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppre
This study aimed at identifying the trend to applying the Joint Audit as an approach to improve the financial reports quality with all their characteristics (Relevance, Reliability, Comparability, Consistency), as well as enclose the difficulties that faced the auditors in the Gaza Strip in implementing the Joint Audit. In order to achieve the study aims, a measure was used to identify the trend to apply the Joint Audit and it was distributed to the study sample which is consisting of (119) individuals and retrieved thereof (99) valid for analysis, approximately (83.2%), (69) of them are Auditors, (30) financial managers and accountants. The researcher used the analytical descriptive method, and after analyzing the results, the s
... Show MoreEthnographic research is perhaps the most common applicable type of qualitative research method in psychology and medicine. In ethnography studies, the researcher immerses himself in the environment of participants to understand the cultures, challenges, motivations, and topics that arise between them by investigating the environment directly. This type of research method can last for a few days to a few years because it involves in-depth monitoring and data collection based on these foundations. For this reason, the findings of the current study stimuli the researchers in psychology and medicine to conduct studies by applying ethnographic research method to investigate the common cultural patterns language, thinking, beliefs, and behavior
... Show MoreRetained soft tissue foreign bodies following injuries are frequently seen in the Emergency and Plastic Surgery practice. The patients with such presentations require a watchful and detailed clinical as- sessment to overcome the anticipant possibility of missing them. However, the diagnosis based on the clinical evaluation is usually challenging and needs to be supported by imaging modalities that are suboptimal and may fail in identifying some types of foreign bodies. Owing to that, serious complications such as chronic pain, infection, and delayed wound healing can be faced that necessitate a prompt intervention to halt those detrimental consequences. The classical method of removal is a surgical exploration which is not free of risks.
... Show MoreEMS in accordance with ISO 14001: 2015 is considered an entry point to reduce environmental impacts, especially the effects resulting from the oil industry, which is the main source of environmental pollution and waste of natural resources, since the second revision of the standard took place in September 2015. The problem of the research was manifested in the weakness in understanding the correct guidelines that must be followed in order to obtain and maintain the standard. The purpose of this research was to give a general picture of what is behind ISO14001:2015 and how it is possible to create a comprehensive base for understanding its application by seeking the gap between the actually achieved reality, standards requirements
... Show MoreA simple, environmental friendly and selective sample preparation technique employing porous membrane protected micro-solid phase extraction (μ-SPE) loaded with molecularly imprinted polymer (MIP) for the determination of ochratoxin A (OTA) is described. After the extraction, the analyte was desorbed using ultrasonication and was analyzed using high performance liquid chromatography. Under the optimized conditions, the detection limits of OTA for coffee, grape juice and urine were 0.06 ng g−1, 0.02 and 0.02 ng mL−1, respectively while the quantification limits were 0.19 ng g−1, 0.06 and 0.08 ng mL−1, respectively. The recoveries of OTA from coffee spiked at 1, 25 and 50 ng g−1, grape juice and urine samples at 1, 25 and 50 ng mL
... Show MoreIn this paper, we attempt to predict the depositional environments with associated lithofacies of the main reservoir of the late Cretaceous Mishrif carbonate Formation, depending on the analysis of the created seismic isopach map by integrating seismic and well data. The isopach map was created from a 3D-seismic reflection survey carried out at the Dujaila oil field in southeastern Iraq, which is of an area of 602.26 Km2, and integrated with the data of the two explored wells. Based on the interpretation of the seismic isopach map, the diagram of the 3D-depositional environment model of Mishrif Formation was constructed. It showed three distinguished depositional environments, which were graduated from a back reef lithofacies of a shallo
... Show MoreThis paper concerns the study of ripples that occur on the windward of Barchan dunes from the dunes field of Najaf governorate, Iraq. These dunes consist mainly of sand sediments with variable sizes, including medium, fine, and very fine sands. Quartz represents the major light mineral in the Najaf Dunes sand. The prevailing wind direction in the study area is NW-SE. The major ripple crest series of every pattern are oriented perpendicular to the NW-SE wind direction, whereas imbricated ripple groups within the troughs of the preexisting ripples are created by the WSW-ENE wind trend. These ripples tend to be formed by shortened ripples that occupy the troughs of the prolonged series. All crests of the ladderback ripples are oriented at r
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More