Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Villages in most rural areas of the developing world, including Iraq, suffer from a deterioration in the urban structure in its various aspects, both in the lack of internal planning in terms of residential unit design which is not commensurate with the sustainable health life, in addition to the lack of infrastructure and community services networks As well as road networks linking them to neighboring urban centers, which was accompanied by the emergence of other problems, including the desire of the population to migrate to neighboring cities and the deterioration of economic activities due to lack of activation of economic development plans (Rural villages suffer from a lack of interest in urban development within the regional spatial
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThis research investigates manganese (Mn) extraction from Electric Arc Furnace Steel Slag (EAFS) by using the Liquid-liquid extraction (LLE) method. The chemical analysis was done on the slag using X-ray fluorescence, X-ray diffraction, and atomic absorption spectroscopy. This work consisted of two parts: the first was an extensive study of the effect of variables that can affect the leaching process rate for Mn element from slag (reaction time, nitric acid concentration, solid to liquid ratio, and stirring speed), and the second part evaluates the extraction of Mn element from leached solution. The results showed the possibility of leaching 83.5 % of Mn element from the slag at a temperature of 25°C, nitric acid co
... Show MoreCoffee is the most essential drink today, aside from water, the high consumption of coffee and the byproducts of its soluble industries such as spent coffee grounds can have a negative effect on the environment as a source of toxic organic compounds. Therefore, caffeine removal from the spent coffee ground can be applied as a method to limit the effect of its production on the environment. The aim of this study is to determine the kinetics and thermodynamics parameters and develop models for both processes based on the process parameters by using traditional solid-liquid extraction and Ultrasound-assisted extraction methods. The processes were performed at a temperature range of 25 to 55 °C for traditional and ultrasound baths, and
... Show MoreA single step extraction-cleanup procedure using porous membrane-protected micro-solid phase extraction (μ-SPE) in conjunction with liquid chromatography–tandem mass spectrometry for the extraction and determination of aflatoxins (AFs) B1, B2, G1 and G2 from food was successfully developed. After the extraction, AFs were desorbed from the μ-SPE device by ultrasonication using acetonitrile. The optimum extraction conditions were: sorbent material, C8; sorbent mass, 20 mg; extraction time, 90 min; stirring speed, 1000 rpm; sample volume, 10 mL; desorption solvent, acetonitrile; solvent volume, 350 μL and ultrasonication period, 25 min without salt addition. Under the optimum conditions, enrichment factor of 11, 9, 9 and 10 for AFG2, AFG1
... Show MoreImage compression is an important tool to reduce the bandwidth and storage
requirements of practical image systems. To reduce the increasing demand of storage
space and transmission time compression techniques are the need of the day. Discrete
time wavelet transforms based image codec using Set Partitioning In Hierarchical
Trees (SPIHT) is implemented in this paper. Mean Square Error (MSE), Peak Signal
to Noise Ratio (PSNR) and Maximum Difference (MD) are used to measure the
picture quality of reconstructed image. MSE and PSNR are the most common picture
quality measures. Different kinds of test images are assessed in this work with
different compression ratios. The results show the high efficiency of SPIHT algori
Key-frame selection plays an important role in facial expression recognition systems. It helps in selecting the most representative frames that capture the different poses of the face. The effect of the number of selected keyframes has been studied in this paper to find its impact on the final accuracy of the emotion recognition system. Dynamic and static information is employed to select the most effective key-frames of the facial video with a short response time. Firstly, the absolute difference between the successive frames is used to reduce the number of frames and select the candidate ones which then contribute to the clustering process. The static-based information of the reduced sets of frames is then given to the fuzzy C-Means algor
... Show MoreConstructing a fine 3D geomodel for complex giant reservoir is a crucial task for hydrocarbon volume assessment and guiding for optimal development. The case under study is Mishrif reservoir of Halfaya oil field, which is an Iraqi giant carbonate reservoir. Mishrif mainly consists of limestone rocks which belong to Late Cenomanian age. The average gross thickness of formation is about 400m. In this paper, a high-resolution 3D geological model has been built using Petrel software that can be utilized as input for dynamic simulation. The model is constructed based on geological, geophysical, pertophysical and engineering data from about 60 available wells to characterize the structural, stratigraphic, and properties distribution along
... Show More