Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Worldwide, enormous amounts of waste cause major environmental issues, including scrap tires and plastic, and large waste, a consequence of the demolition of buildings, including crushed concrete, crushed clay bricks, and crushed thermo-stone. From that point, it’s possible to consider that the recycling processes for these materials and using them in the manufacturing field will reduce the adverse effects on the environment of these wastes and the consumption of natural resources. Sustainable concrete blocks can be considered as one of the products produced by using these materials as partial volume replacement of the coarse, fine aggregate, or cement content, considering their dry density, workability, absorption, co
... Show MoreA session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c
Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreThis work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.
The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged
... Show MoreThe term "semantic exchange" was popularized in Arabic, especially in derivatives, grammatical structures, etc., but it came under different names or terms, including deviation, deviation, transition, displacement, tooth breach, replacement, attention, etc. In the rooting of this term through its study in language and terminology, and among linguists, grammar and others, we have reached a number of results, including The existence of a harmonization between the lexical and idiomatic meaning of the term exchange, and the phenomenon of semantic exchange is a form of expansion in language, and that the first language scientists They had turned to this And studied under Cairo for different names, as noted above.
A study of the hadiths of supplication orchestration
In this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.