Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
The accounting system of government is considered an important tool to follow up the financial transactions that reflect the activities of governmental units and by which the useful information for estimating governmental annual revenues and expenditures are provided through the state public budget because it is an information system that provides detailed past performance, as well as measures the efficiency of the governmental agencies performance in implementing the budget, and the of success governmental units is measured through the type of services and programs offered, their size and the possibility of achieving the objectives assigned to them. The medical evacuation program is one of the medical and curative health services provid
... Show MoreBackground: A carefully planned clinical medical education is critical for the provision of supportive clinical educational environment. The latter will ensure effective teaching, active learning and good attitudes and performance at the bedside. The aim of this study was to evaluate clinical learning environment at AL-Diwaniyah Teaching Hospital. Materials and Methods: A descripitive cross-sectional study involved resident doctors from Internal Medicine and Surgery departments who had six months or more residency training in the respective departments. Data were collected using the Postgraduate Hospital Educational Environment Measure. Data where analyzed using the Statistical Package for Social Sciences version 21.0 and presented us
... Show MoreOBJECTIVE: To evaluate the patient satisfaction to hospital services and identify factors that influences this satisfaction.
Background: Medical-surgical nurses are responsible of providing competent care to clients with a wide-array of acute and chronic health problems. This challenging task requires arming nurses with advanced competencies of health literacy to effectively educate their clients. However, evidence about medical-surgical nurse’s health literacy-related knowledge and experience is limited. Purposes: This study aimed to determine the level of the health literacy-related knowledge and experience among medical-surgical nurses.Design: A descriptive-cross-sectional study was conducted among a total sample of 177 nurses who were practicing in medical-surgical wards in teaching hospitals in Iraq. A convenience sampling method was used to sele
... Show MoreThe technology in continuous and quick development, that reflects in all parts of our life and interred both scientific and practical fields. Marketing is one of them, a customer’s way to deal with choosing and demanding the product deferent from the traditional way. Some of the buying processes are electronic now, therefore the current research is identifying the digital channels that entered the world of marketing and influenced the activities and types that fall under this name and how it affects in positioning strategy, which is how to install the product or brand in the mind of the customer and was dimensions (brand identity, brand personality, brand communication, brand awareness, brand image), The researcher took t
... Show MoreThe Audit evedances represent the reconciliation tools between the Financial data shown on financial statements, and the level of satisfaction level of the Auditor about these statements. According that, the Auditor try to achieve the highest quantity of These evidances, and the most satisfactive of it…, but that will be so hard sometimes, when the internal controlling system is not good, and when the Auditor had some satisfied evidences, but not sharp… So, this research comes to inspect the relation between the quantity, and the level of satisfaction, and argument to prove that evidences gives. This research assumes that getting enough evidences leads to reduce faults, improves the auditing operation, and avoids risks. The research
... Show MoreIn latest decades, genetic methods have developed into a potent tool in a number of life-attaching applications. In research looking at demographic genetic diversity, QTL detection, marker-assisted selection, and food traceability, DNA-based technologies like PCR are being employed more and more. These approaches call for extraction procedures that provide efficient nucleic acid extraction and the elimination of PCR inhibitors. The first and most important stage in molecular biology is the extraction of DNA from cells. For a molecular scientist, the high quality and integrity of the isolated DNA as well as the extraction method's ease of use and affordability are crucial factors. The present study was designed to establish a simple, fast
... Show MoreImage segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show More