Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Buzurgan oil field suffers from the phenomenon of asphaltene precipitation. The serious negatives of this phenomenon are the decrease in production caused by clogging of the pores and decrease in permeability and wettability of the reservoir rocks, in addition to the blockages that occur in the pipeline transporting crude oil. The presence of laboratories in the Iraqi oil companies helped to conduct the necessary experiments, such as gas chromatography (GC) test to identify the components of crude oil and the percentages of each component, These laboratory results consider the main elements in deriving a new equation called modified colloidal instability index (MCII) equation based on a well-known global equation called colloidal instabi
... Show MoreBuzurgan oil field suffers from the phenomenon of asphaltene precipitation. The serious negatives of this phenomenon are the decrease in production caused by clogging of the pores and decrease in permeability and wettability of the reservoir rocks, in addition to the blockages that occur in the pipeline transporting crude oil. The presence of laboratories in the Iraqi oil companies helped to conduct the necessary experiments, such as gas chromatography (GC) test to identify the components of crude oil and the percentages of each component, These laboratory results consider the main elements in deriving a new equation called modified colloidal instability index (MCII) equation based on a well-known global equation called colloidal in
... Show MoreIn this research, a factorial experiment (4*4) was studied, applied in a completely random block design, with a size of observations, where the design of experiments is used to study the effect of transactions on experimental units and thus obtain data representing experiment observations that The difference in the application of these transactions under different environmental and experimental conditions It causes noise that affects the observation value and thus an increase in the mean square error of the experiment, and to reduce this noise, multiple wavelet reduction was used as a filter for the observations by suggesting an improved threshold that takes into account the different transformation levels based on the logarithm of the b
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreThe largest use of x-ray in medical by dentists, employers or persons that needed by patients with specific conditions, lead to higher exposure of x-ray that may cause many diseases. In the present work radiography films have been used in evaluating the efficiency of using unsaturated polyester polymer reinforced with lead oxide (PbO) as shield material for medical x-ray devices, many parameters studied like concentration and thickness that they are increasing the attenuation of x-ray in them. The results show that the attenuation of X-ray increasing with concentration of reinforced material and with thickness, and the optical density decreases with increasing concentration from 0% to 50%, we chose 30% as suitable concentration to increase
... Show MoreMany approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
Abstract
Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it
... Show More