Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThis study examines the structural performance of concrete-encased pultruded Glass Fiber Reinforced Polymer (GFRP) I-sections with shear connections. It specifically focuses on how different parameters affect the latter’s ductility, flexural strength, and load-carrying capacity. The key variables studied include various shear connector types, spacing, and geometries, as well as the compressive strength of concrete and the properties of GFRP. The finite element modeling and experimental validation show that the shear connectors significantly improve the ductility, ultimate capacity, and load transmission efficiency. The present review emphasizes that the shear connectors greatly enhance the structural performance when they are prop
... Show MoreIn this work, we focused on studying 1,4-naphthoquinones and their derivatives, and knowing the methods of preparing them using different auxiliary agents and forming derivatives containing heterocyclic rings, active groups and saturated rings containing heterogeneous elements . In addition, due to their strong antibacterial, antifungal and anticancer activity, 1,4-naphthoquinone compounds biological importance and are considered a source of various pharmaceutical compounds.
Background: Elastomeric chains are used to generate force in many orthodontic procedures, but this force decays over time, which could affect tooth movement. This study aimed to study the force degradation of elastomeric chains. Data and Sources: An electronic search on Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, LILACS, and PubMed was made, only articles written in English were included, up to January 2022.Study selection: Fifty original articles, systematic reviews, and RCTs were selected. Conclusion: Tooth movement, salivary enzymes, alcohol-containing mouthwash, whitening mouthwash, and alkaline and strong acidic (pH <5.4) solutions all have a significant impact on elastomeric chain force degradation. T
... Show MoreAbstract The avulsion of the flexor digitorum profundus, also known as the jersey finger, is a well-known injury that can be treated surgically. It has been classified into four types, among them type IV which involves tendon avulsion from an associated bony fragment with subsequent retraction to the palm or proximal interphalangeal joint is very rare. We present a case of type IV injury in a 45-year-old man with a pulling-on injury. The repair followed a pull-out technique (reinserting the tendon into the avulsed fragment); the entire reduction was tied over a button on the dorsal aspect of the nail and was augmented with a volar plate. The case was reported due to its rarity. We found that early surgical management of this problem greatly
... Show Morewhich is much useful in the Arabic Language generally in the Holly Quran especially. It is the pronoun I have taken in the semantic aspect from it and I have done on the surra sabba which varities the semantical pronoun in it among the pronoun of the speaker the conscience of the addressee the absent such the the siprat pronoun that comes in it with the explanation for its importance and its work and this is the subject of the first unit which I advanced it from the concept of the pronoun Linguistically and convention. After that I have lighten in some meanings which I have done in the surrat as a semantic , magnification , proud, reprimand and others which I ended my research I have reached the results from it
... Show Moreالنظام السياسي اليمني : دراسة في المتغيرات الداخلية
