Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Engineering Research And Advanced Technology
The Use of First Order Polynomial with Double Scalar Quantization for Image Compression
...Show More Authors

Publication Date
Wed Jan 28 2015
Journal Name
Al-khwarizmi Engineering Journal
Thermal Field Analysis of Oblique Machining Process with Infrared Image for AA6063-T6
...Show More Authors

Abstract

 Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
Impact of COVID-19 Vaccine on Hearing Status of Young Ages (Medical College Students as a Sample)
...Show More Authors

Many studies dealt with the consequences of  SARS CoV-2  (which cause COVID-19 infection) on the nervous system especially sensory nerves where the virus causes loss of taste and smell as it’s known, and may affect auditory nerves and be the expected cause of some hearing problems. A case-control analytic study was performed on a connivance sample of society of university students from a medical faculty. Each participant filled out a questionnaire contains demographic data and general, auditory and respiratory health condition, in addition to vaccination status. In the other side, the audio- examinations were performed on the study sample including Pure Tone Audiometry (PTA) and tympanometry. Two statistical methods; chi-square and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EXTRACTION AND CHARACTERATION OF MUCILAGE EXTRACTED FROM MUSTARD SEEDS: EXTRACTION AND CHARACTERATION OF MUCILAGE EXTRACTED FROM MUSTARD SEEDS
...Show More Authors

The mucilage was isolated from mustard seeds and identification by some different methods like, thermo gravimetric, FTlR., X-ray powdered, proton NMR, FTIR spectra of the three gums contain different functional group in the gums, major peaks  bands noticed were belong to OH (3410.15 – 3010.88) group from hydroxyl group, CH aliphatic (2925-2343.51), C-O (1072.42-1060.85) group and C=O 1743.65, Thermo chemical parameters of mucilage was evaluated  and compared with the standard gums, Results indicated the mucilage was decomposed in 392°C and mass loss 55%, The X ray process found the mucilage had single not sharp peak

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 09 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Antimicrobial Activity of Moringa Oleifera Extract in Comparison to Chlorhexidene Gluconate (In vitro study)
...Show More Authors

Background: Oral diseases persist to be a major health problem all over the world. Various bacteria and fungi are found to be the possible pathogensresponsible for the oral diseases. Moringa oleifera it is an extraordinary nutritious vegetable tree with many different uses. These leaves have high medicinal value. In the present study, antibacterial and antifungal activities of aqueous extracts of plant Moringa oleifera in comparison to chlorohexidene gluconate and deionized water were determined. Materials and methods: The leaves of plant of Moringa oleifera were collected from College of Pharmacy; Baghdad, Iraq. Tested microorganism (bacterial and fungal) was isolated from different clinical specimens. In-vitroantimicrobial activity was pe

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Security Intellectual Proposals of the Paris and the Wales Schools
...Show More Authors

The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties  of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 09 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education
An Analysis of the Mathematics Book for the First Intermediate Grade According to the Dimensions of Mathematical Power
...Show More Authors

The current research aims to analyze the mathematics book for the first intermediate grade according to the dimensions of mathematical power by answering the following question: What is the percentage of the availability of the dimensions of mathematical power included in the content of the mathematics textbook for first-grade students, average, in its first, and second parts for the academic year 2020-2021, approved by the Iraqi Ministry of Education / General Directorate of Curricula? The research community was determined by middle school mathematics books, and middle school students for middle ,and high school day schools affiliated to the Directorate of Education in Dhi Qar, and by the intentional test, the research sample was s

... Show More
View Publication
Publication Date
Wed Dec 22 2021
Journal Name
Antibiotics
Classic vs. Novel Antibacterial Approaches for Eradicating Dental Biofilm as Adjunct to Periodontal Debridement: An Evidence-Based Overview
...Show More Authors

Periodontitis is a multifactorial chronic inflammatory disease that affects tooth-supporting soft/hard tissues of the dentition. The dental plaque biofilm is considered as a primary etiological factor in susceptible patients; however, other factors contribute to progression, such as diabetes and smoking. Current management utilizes mechanical biofilm removal as the gold standard of treatment. Antibacterial agents might be indicated in certain conditions as an adjunct to this mechanical approach. However, in view of the growing concern about bacterial resistance, alternative approaches have been investigated. Currently, a range of antimicrobial agents and protocols have been used in clinical management, but these remain largely non-v

... Show More
View Publication Preview PDF
Crossref (22)
Crossref