Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreBurn is one of the most devastating traumas that someone can encounter in their life. Burn wound sepsis is still the leading cause of death in burned patients. Appropriate knowledge of the causative pathogen in burn sepsis is important for successful patient management and for the reduction of the incidence of antibiotic resistance. A retrospective study was conducted between 2010 and 2018 at the Burn Specialty Hospital in Baghdad.Atotal of 320 blood culture samples were obtained from patients with sepsis orsuspected of having sepsis. Patient age ranged between 9 months to 70 years old, with a mean total burn surface area of 45.26%. The most common microorganisms isolated from those patients who had sepsis or suspicion of sepsis were Klebsi
... Show MoreBackground: The study was designed for the assessment of the knowledge of medical students regarding pandemics. In the current designed study, the level of awareness was checked and the majority of students were found aware of SARS-CoV and SARS-Cov2 (Covid-19).
Objective: To assess the awareness of SARS-CoV and SARS-Cov2 (Covid-19) among medical students of Pakistan.
Subjects and Methods: A cross-sectional survey was carried out in different universities of Pakistan from May to August 2020. A self-constructed questionnaire by Pursuing the clinical and community administration of COVID-19 given by the National Health Commission of the People's Republic of China was used am
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreMany cities suffer from the large spread of slums, especially the cities of the Middle East. The purpose of the paper is to study the reality of informal housing in Al-Barrakia and the most important problems that it suffers from. The paper also seeks to study the presence or absence of a correlation between urban safety indicators and urban containment indicators as one of the methods of developing and planning cities. This can be achieved through sustainable urban management. The slums are a source of many urban problems that threaten the security and safety of the residents and represent a focus for the concentration of crimes and drugs. The paper seeks to answer the following question: How can urban safety be improved through urban cont
... Show MoreVillages in most rural areas of the developing world, including Iraq, suffer from a deterioration in the urban structure in its various aspects, both in the lack of internal planning in terms of residential unit design which is not commensurate with the sustainable health life, in addition to the lack of infrastructure and community services networks As well as road networks linking them to neighboring urban centers, which was accompanied by the emergence of other problems, including the desire of the population to migrate to neighboring cities and the deterioration of economic activities due to lack of activation of economic development plans (Rural villages suffer from a lack of interest in urban development within the regional spatial
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreConstructing a fine 3D geomodel for complex giant reservoir is a crucial task for hydrocarbon volume assessment and guiding for optimal development. The case under study is Mishrif reservoir of Halfaya oil field, which is an Iraqi giant carbonate reservoir. Mishrif mainly consists of limestone rocks which belong to Late Cenomanian age. The average gross thickness of formation is about 400m. In this paper, a high-resolution 3D geological model has been built using Petrel software that can be utilized as input for dynamic simulation. The model is constructed based on geological, geophysical, pertophysical and engineering data from about 60 available wells to characterize the structural, stratigraphic, and properties distribution along
... Show More