Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Tendon is important structure of the human body, since it can sustain tensile loading. The primary function of this tissue is to stabilize the joints they attached to it during daily activities. As well as, tendon has viscoelastic properties that can determine their response to loading and restrict the potential of injuries. One of the major points that this paper works with is the study of the biomechanical behaviour of tendon in response to tensile loading to describe their biological behaviour. Also, conclude the mathematical expression that may illustrate the tendon behaviour. All of the experiments were made in Physiology laboratories / Medical College/ Al- Nahrain University on ten rats "Rattus Norvegicus" of [108- 360] gm weight f
... Show MoreThe research aims to study the effect of an increase in funding the Equity by issuing new common shares on revenues ordinary shares, despite the issuance and marketing costs and the introduction of new shareholders that companies incur when issuing new common shares but it is the most important methods used to finance the Equity is funding the common shares it provides money sufficient to finance the large investments of the company and enhance the confidence of dealers with the company, so I designed this research in order to identify the impact of increased funding Equity issue new common shares to common shares revenues.
This research has included some of the theoretical concepts to each of the Equity
... Show MoreVerrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs a
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
A study of the Torymid collection of Iraq. resulted in undescribed species of the genus
Liodontonierus Gah. L. longicorpus sp. n. with 2 figures.
Twelve species of philodromid crab or running crab spiders (Philodromidae) have been recorded in Armenia. Nine species are new to the spider fauna of this country: Philodromus cespitum (Walckenaer, 1802); Philodromus emarginatus (Schrank, 1803), Philodromus rufus Walckenaer, 1826; Rhysodromus histrio (Latreille, 1819), Thanatus atratus Simon, 1875; Thanatus formicinus (Clerck, 1757); Thanatus imbecillus L. Koch, 1878; Thanatus vulgaris Simon, 1870 and Thanatus pictus L. Koch, 1881.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called