Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Objectives: The study objectives are to determine the impact of education program upon the academic nurses'
practice concerning documentation of nursing sheets, and to find out the relationship between nurses knowledge
and their demographic characteristics, which include age, sex, and years of experience in medical and surgical
wards.
Methodology: A quasi- experimental study was carried out at the medical and surgical wards in teaching
hospitals in Sulaimani governorate from the beginning of March up to June 2007٠
To reach the objectives of the study anon-probability (purposive) sample of (25) academic nurses who work in
the medical and surgical wards in teaching hospitals.
The data were collected through the use
Developing and researching antenna designs are analogous to excavating in an undiscovered mine. This paper proposes a multi-band antenna with a new hexagonal ring shape, theoretically designed, developed, and analyzed using a CST before being manufactured. The antenna has undergone six changes to provide the best performance. The results of the surface current distribution and the electric field distribution on the surface of the hexagonal patch were theoretically analyzed and studied. The sequential approach taken to determine the most effective design is logical, and prevents deviation from the work direction. After comparing the six theoretical results, the fifth model proved to be the best for making a prototype. Measured results rep
... Show MoreObjective: the aim of this study is to determine the level of students' knowledge about the environmental health.
Methodology: The cross-sectional study was conducted at the College of Health and Medical Technology in Baghdad
city during the period from 1st march till 1st of July 2012. Data was collected by self-recording of a previously designed
questionnaire to obtain socio-demographic information such as (age, gender, department, year of grade).
Results: The highest rate of students were in the 2nd year followed by the 3rd year, highest rate of students had low
level of knowledge followed by intermediate level of knowledge, while lowest rate of students on had high level of
knowledge .Females had higher level of know
The evaluation of banks plays an important role in maintaining the interests of customers with the bank as well as providing continuous supervision and control by the Central Bank. The Central Bank of Iraq conducted an assessment of the Iraqi banks through the implementation of the CAMEL model during a certain period. This evaluation did not continue. The research provides continuity to the Central Bank's assessment and as a step to continue the evaluation process for all banks through the use of the CAMEL model. ROA and ROE by using the regression model for four Iraqi banks registered in the Iraqi market for securities during the period 2010-2016. The results showed that the capital and profitability indicators have a significan
... Show MoreInternational news websites, including Russia Today, pay special attention to the media image of Afghan women, especially after the Taliban movement took control of Afghanistan. Therefore, it was necessary to know the image of the Afghan woman, the fate of the rights she acquired in recent years, and the transformations that affected her after the Taliban took control of the government, and studied them on international news sites, specifically Russia Today.
The researcher summarized the problem of this study in the following question: What is the media image of the Afghan woman on the Russia Today news site?
... Show More
Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreThe lower respiratory tract of sheep was studied to determine the torsion and branching of the bronchial tree. The respiratory system of ruminants and all living organisms is one of the most important organs in the body that controls the amount of gas exchange between the heart and lungs through the airways, it is clear that in sheep it consists of a narrow bronchial tube that reaches the extent of lung tissue repercussions. He used silicon, water, acid, and at room temperature, and the substance was injected with an injection gun through the trachea and was pushed gently to spread and distribute in all parts of the lungs with moderate manual pressure. The results showed that the mold shape in the lung and the bronchial branches of
... Show MoreThe study aimed to determine the extent of market knowledge in the companies researched, as if market knowledge is qualified to lead the companies researched to achieve marketing performance , for this purpose, formulated hypotheses of the study in three hypotheses, the first major hypothesis "there is a correlation with significance of market knowledge to improve the marketing performance , "while the second major hypothesis, "there is a significant moral influence of market knowledge to improve the marketing performance " these hypotheses targeting to determine the role played by market knowledge in the leadership of companies researched to achieve improvement in marketing perfor
... Show MoreThe current phase distinguish by the rapid scientific development, which pushes individuals to have the necessities of scientific and practical life through the proper scientific thinking which contribute to the development of invention and creativity away from memorizing and indoctrination and encouraging individuals to looking for information and then attempting to process and develop these information instead of being a passive receiver. The investment of minds becomes the logical investment in all societies by preparing the citizen to become able to face life changes and its necessities. It is very important to take care of individuals and develop their mental abilities and thinking skills. The constructive strateg
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show More