Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Apr 17 2008
Journal Name
Anbar Journal Of Agricultural Sciences 6 (2)‏
Influence of foliar sprays with Copper and Zinc on the resistance of citrus rootstocks to gumosis caused by Phytophthora citropthora. ‏
...Show More Authors

Publication Date
Wed Jan 01 2014
Journal Name
Journal Of Physical Education
The use of physical exercises of mind (knowledge) to develop the level of performance of the rulers of women's football
...Show More Authors

Football from popular task the referees the most important elements this game through this study shows the importance of physical training mental and its effects the level of performance for referees and especially woman referees which entered the game in the newly in our country was used physical exercise mind through films and means to assist through visualization some of the cases do the articles of law and also exercises the evolution of the level of performance of the rulers of woman the research sample 12 of referees certified by the Iraqi central football and referees committee achtbarien was chosen for this study including mental cognitive test approved by the referees committee the second test questionnaire to assess the level of p

... Show More
Publication Date
Sun Jul 01 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
GENOTYPE VERSUS PHENOTYPE TO DETERMINE THE DEFINITIVE IDENTIFICATION OF THE GENERA CHLORELLA BEIJERINCK, 1890 (CHLORELLACEAE) AND COELASTRELLA CHODAT, 1922 (SCENDESMACEAE)
...Show More Authors

    Conventional identification of three coccoid green algae isolates was attempted to characterize the studied algae morphologically under compound microscope, which demonstrated confusional phenomenal convergence; all were classified microscopically as the green alga Chlorella vulgaris Beijerinck, 1890.

 

    Phylogenetic studies were conducted to settle the argument about the phenotype by studying the genotype. Genotype the promising field in advance classification by using 18S rRNA and compared to GenBank database using to search the related sequences. The determined sequences showed high a similarity to the strains registered in GenBank.

 

  &

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Reliability Estimation Of Fuzzy Failure Times Of Free Distribution And It Use To Estimate The Fuzzy Reliability Of Mosul Dam
...Show More Authors

The way used to estimate the fuzzy reliability differs according to the nature of the information of failure time which has been dealt in this research.The information of failure times has no probable distribution to explain it , in addition it has fuzzy quality.The research includes fuzzy reliability estimation of three periods ,the first one from 1986 to 2013,the second one from 2013 to 2033 while the third one from 2033 to 2066 .Four failure time have been chosen to identify the membership function of fuzzy trapezoid represented in the pervious years after taking in consideration the estimation of most researchers, proffional    geologists and the technician who is incharge of maintaining of Mosul Dam project. B

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 18 2020
Journal Name
Diagnostics
Diagnostic Accuracy of Oral Fluids Biomarker Profile to Determine the Current and Future Status of Periodontal and Peri-Implant Diseases
...Show More Authors

Severe periodontitis is ranked as the sixth most prevalent disease affecting humankind, with an estimated 740 million people affected worldwide. The diagnosis of periodontal diseases mainly relies upon assessment of conventional clinical parameters. However, these parameters reflect past, rather than current, clinical status or future disease progression and, likely, outcome of periodontal treatment. Specific and sensitive biomarkers for periodontal diseases have been examined widely to address these issues and some biomarkers have been translated as point-of-care (PoC) tests. The aim of this review was to provide an update on PoC tests for use in the diagnosis and management of periodontal diseases. Among the PoC tests developed so

... Show More
View Publication Preview PDF
Scopus (58)
Crossref (58)
Scopus Clarivate Crossref
Publication Date
Wed May 17 2023
Journal Name
Journal Of Engineering
Design of a Differential Chaotic on-off keying communication system
...Show More Authors

Among the available chaotic modulation schemes, differential chaos shift keying (DSCK) offers the perfect noise performance. The power consumption of DCSK is high since it sends chaotic signal in both of 1 and 0 transmission, so it does not represent the optimal choice for some applications like indoor wireless sensing where power consumption is a critical issue. In this paper a novel noncoherent chaotic communication scheme called differential chaos on-off keying (DCOOK) is proposed as a solution of this problem. With the proposed scheme, the DCOOK signal have a structure similar to chaos on-off keying (COOK) scheme with improved performance in noisy and multipath channels by introducing the concept of differential coherency used in DCS

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 05 2024
Journal Name
Review Of Clinical Pharmacology And Pharmacokinetics - International Edition
Isolation and characterization of a tetrahydroprotoberberine alkaloid from Crassula ovata
...Show More Authors

The presence of alkaloids in Crassula ovata is a topic that is still unexplored, as there are no published studies on the matter. This study demonstrates the presence of an alkaloid compound (and its class) for the first time in Crassula ovata. The plant material was defatted with n-hexane, and a Soxhlet apparatus was used for the extraction process, while the acid-base method was used for the isolation of alkaloids from the chloroform fractions. The quaternary alkaloid was precipitated from the aqueous layer spontaneously, in high quantity. By using standard spectroscopic methods (including liquid chromatography - mass spectroscopy) we were able to clarify the structure of the precipi¬tated compound as a tetrahydroprotoberberine a

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Fri Mar 30 2018
Journal Name
International Journal Of Multimedia And Image Processing
The Design of a Multimedia-Forensic Analysis Tool (M-FAT)
...Show More Authors

Digital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref