Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
A procedure, depending on the derivatization and determination of aniline was depicted andvalidated in this study. 8-hydroxyquinoline (8-HQ) was used as the derivatizing agent for thedetermination of aniline. An optimization study was performed for the derivatization reaction, i.e.,the diazonium coupling reaction, the optimum parameters were as follows: 22 mM of hydrochloricacid, 54mM of sodium hydroxide, and 1.8mM of sodium nitrate. The optimization study of themethod of cloud point extraction (CPE) revealed that the extraction solvent was 0.5 ml of Triton X-100, the optimum temperature was 90 °C, and the incubation time was 25 min. The linearity,correlation coefficients, molar absorptivities, and limits of detection were improved using t
... Show MoreFencing sport coaches seek fencers who have high velocity and work hard to develop it through training. The research problem lies on when measuring movement abilities through some tests. Manual measurement does not give reasonable impartiality of timing because there is a time-frame between the movement of the fencer and the speed of the movement of the human time setter. Therefore, the authors sought to design an electronic vest to evaluate movement abilities in foil fencers. The study design was experimental, with 12 Iranian foil fencers of the national team, who were divided into two equal groups of 6 fencers. Moreover, there were 12 students from Physical Education and Sport Sciences that worked on the scientific f
... Show MoreAbstract :In this study, amygdaline in Iraqi plant seeds was extracted and isolated from their seeds matrix using reflux procedure and subsequently identified and determined by high performance liquid chromatography (HPLC) on reversed phase column of LC-18 (150mm x 4.6mm, 5?m )with actonitrile :water ( 50 : 50 ) as mobile phase at flow rate of ( 0.5 mL/min ) and detection at wavelength of 215 nm.The experimental results indicated that the linearity of calibration is in the range of 1.0-30.0 mg L-1amygdaline with the correlation coefficient of 0.9949. The limit of detection (LOD) and limit of quantitation (LOQ) for amygdaline were of 0.88 and 2.93 mg L-1 in standard pure sample. The mean recovery percent is 97.34±0.58 at 95% confidence inte
... Show MoreAs a result of the entry of multinationals companies in Iraq for investing in the joint projects through conducting agreements and contracts for work on important and strategic projects to get the necessary funds and various experiences which characterize the foreign participant sides that Iraq currently needs them and because of the non-applying the accounting processing stipulated in the unified accounting system in addition to the absence of a local accounting bases as well as the default of the participant contracts on indicating the accounting methods about those projects which are considered one of the bases that enables auditors in the public sector to depend on it, thus the research paper deals with studying an
... Show MoreWith the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se
... Show MoreFG Mohammed, HM Al-Dabbas, Iraqi journal of science, 2018 - Cited by 6
The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show MoreThe effect of using three different interpolation methods (nearest neighbour, linear and non-linear) on a 3D sinogram to restore the missing data due to using angular difference greater than 1° (considered as optimum 3D sinogram) is presented. Two reconstruction methods are adopted in this study, the back-projection method and Fourier slice theorem method, from the results the second reconstruction proven to be a promising reconstruction with the linear interpolation method when the angular difference is less than 20°.