Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Diatoms are considered a potentially new and valuable source of biologically active compounds including those with antimicrobial properties; so, this study was conducted to evaluate the antibacterial activity of Navicula incerta. The diatom was isolated from the salt water of Sawa Lake, southern of Iraq, it was cultivated in salt water then was adapted and cultivated in freshwater environment; the harvested and dried biomass was extracted, and the antibacterial activity of each extract was evaluated against several species of pathogenic bacteria. The chemical constituents of the extracts were also analyzed using Gas chromatography/Mass spectrometry technique. Generally, the result showed that fresh water extract of N. incert
... Show MoreObjective(s): To determine the impact of the electronic Health Information Systems upon medical, medical Backing and administrativedecisions in Al-Kindy Teaching Hospital. Methodology: A descriptive analytical design is employed through the period of June 14th 2015 to August 15th 2015. A purposive "non- probability" sample of (50) subject is selected. The sample is comprised of (25) medical and medical backing staff and (25) administrative staff who are all involved in the process of decision making in Al-Kindy Teaching Hospital. A self-report questionnaire, of (68) item, is adopted and developed for the purpo
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreIn every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p
... Show MoreThe current research aims to train students to take benefit of their studies to analyze and taste the artistic works as one of the most important components of the academic structure for students specializing in visual arts; then to activate this during training them the methods of teaching. Consequently, the capabilities of mind maps were employed as a tool that would be through freeing each student to analyze a model of artistic work and think about his analytical principles according to what he knows. Then, a start-up with a new stage revolves around the possibility of transforming this analysis into a teaching style by thinking about how the student would do. The same person who undertook the technical analysis should offer this work
... Show MoreThe aim of this study was to investigate the effect of operating variables on, the percentage of removed sludge (PSR) obtained during re-refining of 15W-40 Al-Durra spent lubricant by solvent extraction-flocculation treatment method. Binary solvents were used such as, Heavy Naphtha (H.N.): MEK (N:MEK), H.N. : n-Butanol (N:n-But), and H.N. : Iso-Butanol (N:Iso:But). The studied variables were mixing speed (300-900, rpm), mixing time (15-60, min), and operating temperature (2540, oC). This study showed that the studied operating variables have effects where, increasing the mixing time up to 45 min for H.N.: MEK, H.N.: n-Butanol and 30 min for H.N.: Iso-Butanol increased the PSR, after that percentage was decreased; increasing t
... Show MoreThe aim of this research work is to evaluate the use of 980 nm diode laser in clotting the blood
in the bone socket after tooth extraction. The objective is to prevent possible clot dislodgement which is
a defect that may lead to possible infection. A number of rabbits were irradiated using 980nm CW mode
diode laser, 0.86W power output for 9s and 15s exposure time. The irradiated groups were studied
histopathologically in comparison with a control group. Results showed that laser photothermal
coagulation was of benefit in minimizing the possibility of the incidence of postoperative complications.
The formation of the clot reduces the possibility of bleeding and infection.