Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Dorsal hand veins features extraction and recognition by correlation coefficient
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 29 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetics and Thermodynamics of Peppermint Oil Extraction from Peppermint Leaves
...Show More Authors

This study aimed to extraction of essential oil from peppermint leaves by using hydro distillation methods. In the peppermint oil extraction with hydro distillation method is studied the effect of the extraction temperature to the yield of peppermint oil. Besides it also studied the kinetics during the extraction process. Then, 2nd -order mechanism was adopted in the model of hydro distillation for estimation many parameters such as the initial extraction rate, capacity of extraction and the constant rat of extraction with various temperature. The same model was also used to estimate the activation energy. The results showed a spontaneous process, since the  Gibbs free energy had a value negative sign.

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon Mar 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of atropine from Datura Innoxia using liquid membrane Technique
...Show More Authors

Selective recovery of atropine from Datura innoxia seeds was studied. Applying pertraction in a rotating film contactor (RFC) the alkaloid was successfully recovered from native aqueous extracts obtained from the plant seeds. Decane as a liquid membrane and sulfuric acid as a stripping agent were used. Pertraction from native liquid extracts provided also a good atropine refinement, since the most of co-extracted from the plant species remained in the feed or membrane solution. Solid–liquid extraction of atropine from Datura innoxia seeds was coupled with RF-pertraction in order to purify simultaneously the extract obtained from the plant. Applying the integrated process, proposed in this study, a product containing 92.6% atropine was

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Stamps extraction using local adaptive k- means and ISODATA algorithms
...Show More Authors

<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi

... Show More
View Publication
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Liquid-Liquid Extraction of Metal Ions Using Aqueous Biphasic Systems
...Show More Authors

An investigation was conducted for the study of extraction of metal ions using aqueous biphasic systems. The extraction of iron, zinc and copper from aqueous sulphate media at different kinds of extractants SCN− , Cl- and I- , different values of pH of the feed solution, phase ratio, concentration of metals, concentration of extractant, concentration of polymer, and concentration of salt was investigated. Atomic absorption spectrophotometer was used to measure the concentration of iron, zinc and copper in the aqueous phase throughout the experiments. The results of the extraction experiments showed the use of SCN− as extractant, pH=2.5, phase ratio=1.5, concentration of metals 1g/l, concentration of extractant 0.06 %, concentration o

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
The political image of Kurds and ideological representation in the Arab novel in Iraq
...Show More Authors

The novels that we have addressed in the research, Including those with the ideological and political ideology, It's carry a negative image for the Kurds without any attempt to understand, empathy and the separation between politics and the people, The novels were deformation of the image, Like tongue of the former authority which speaks their ideas, Such as (Freedom heads bagged, Happy sorrows Tuesdays for Jassim Alrassif, and Under the dogs skies for Salah Salah). The rest of novels (Life is a moment for Salam Ibrahim, The country night for Jassim Halawi, The rib for Hameed Aleqabi). These are novels contained a scene carries a negative image among many other social images, some positive, and can be described as neutral novels. We can

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Principles of Learning Organizations and It`s Role to achieve Group Working: A Viewed Study in Public Company for Webbing Industries in Hilla
...Show More Authors

     Organizations must interact with the environment around them, so the environment must be suitable for that interaction. These companies are now trying to become Learning Organizations because it try to face that challenges may rise from its environments. The Learning Organization is a concept that is becoming an increasingly widespread philosophy in modern companies, from the largest multinationals to the smallest ventures. What is achieved by this philosophy depends considerably on one's interpretation of it and commitment to it. This study gives a definition that we felt was the true ideology behind the Learning Organization and Group Working. A Learning Organization is one in which people at all levels

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 02 2024
Journal Name
Journal Of International Crisis And Risk Communication Research
Manufacturing Consent: A Critical Discourse Analysis of Benjamin Netanyahu's Speech to the United States Congress in 2024” has been accepted for publication in
...Show More Authors

In this paper, the researchers investigate Prime Minister Benjamin Netanyahu's speech before a joint session of the US Congress on July 25, 2024. The researchers primarily aim at highlighting the ideology behind Netanyahu's speech by using qualitative research through the application of critical discourse analysis (CDA), which is employed here in in order to show how certain linguistic choices can manipulate and determine concepts related to power and ideology. The CDA method used is Discourse Historical Approach with the main focus on argumentation management through discursive strategies. The researchers adopt DHA by Wodak (2009) with focusing on the taxonomy of social actor representation by Van Leeuwen (2008). The study reveals th

... Show More
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Ruling on questioning children by the security authorities: (Comparative Study between Sharia and Law)
...Show More Authors

Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Using Machine Learning to Control Congestion in SDN: A Review
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref