Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Self-Assertion is the individual ability to express any emotion well, except the anxiety. The decrease of the individuals asserting behavior makes them face many difficulties that prevent their social adjustment. Moreover it reflexes many negative behavioral and physical cases. The individual, who fails to express his or her negative feelings in required situations, feels with dissatisfaction, loneliness, depression, anxiety, social anxiety, conflict, and psychological disorder.
Accordingly, the importance of this study is represented in studying the self-assertion and studying the university students who reflect the strength of society.
The following are the two aims of the study:
1. Construct an asserting behavior scale.
2.
Fuzzy numbers are used in various fields such as fuzzy process methods, decision control theory, problems involving decision making, and systematic reasoning. Fuzzy systems, including fuzzy set theory. In this paper, pentagonal fuzzy variables (PFV) are used to formulate linear programming problems (LPP). Here, we will concentrate on an approach to addressing these issues that uses the simplex technique (SM). Linear programming problems (LPP) and linear programming problems (LPP) with pentagonal fuzzy numbers (PFN) are the two basic categories into which we divide these issues. The focus of this paper is to find the optimal solution (OS) for LPP with PFN on the objective function (OF) and right-hand side. New ranking f
... Show Moreبسبب محدودية الموارد الطبيعية، فأن سكان الخليج ومنذ القدم وجهوا جلّ نشاطاتهم توجهاً بحرياً: صيد الاسماك وصناعة اللؤلؤ العنصر الرئيس في حجم التشغيل، وتكوين الفائض الاقتصادي في المنطقة آنذاك.
لقد تزايدت أهمية هذا النشاط بخاصة بعد النصف الثاني من القرن التاسع عشر، لرواج تجارة اللؤلؤ عالمياً، وأنفتاح الخليج على الدول الاوروبية التي شهدت نهضة صناعية متسارعة، وحيث وصلت الخليج العديد من بضائع
... Show MoreAn experimental investigation of natural convection heat transfer from an isothermal horizontal,vertical and inclined heated square flat plates with and without circular hole, were carried out in two cases, perforated plates without an impermeable adiabatic hole "open core" and perforated plates with an impermeable adiabatic hole "closed core" by adiabatic plug. The experiments covered the laminar region with a range of Rayleih number of (1.11x106 ≤RaLo≤4.39x106 ), at Prandtle number (Pr=0.7). Practical experiments have been done with variable inclination angles from horizon (Ф=0o ,45o,90o,135oand 180o),facing upward (0o≤Ф<90o), and downward (90o
≤Ф<180o). The results showed that the temperature gradient increases whi
تم التطرق في هذا البحث الى دور الذكاء الاصطناعي والتكنولوجيا الحديثة في العملية التدريبية بما يخدم أهدافه والاستفادة منه من خلال المخرجات الجيدة، حيث ان توظيف التكنولوجيا في تدريب رياضة المبارزة يسهل العملية التدريبية على المدرب واللاعب ويساهم في تقليل الجهد المبذول والوقت المستغرق ، وهدفت الدراسة الى التعرف على تأثير الجهاز المصنع في ضبط المسافة بين القدمين لدى عينة البحث ،استخدم المنهج التجريبي بت
... Show MoreThe Voluntary Obedience has great importance for the modern taxes systems and its management and this is meant the taxpayer whom in charge to pay of his taxes obligations voluntarily , he is very known of himself whereas he prepared his finishing accountings and present them as samples prepared by taxes management and settle the tax sum directly according to specified income , which has an impact to find end to tax evasion as result lead to increase the tax income and achieve the justice for the taxpayer and the state treasury
The Banking Supervision of the most important functions of the Central Bank of Iraq, which he intended to have a strong banking system and a sound and competitive, and exercised control over the banks by inspection bodies to ensure their compliance with the laws, regulations and orders and instructions and the safety of their financial positions.
The research was aimed to release the concept of banking inspection, compliance and problems and obstacles faced by the inspectors, and monitors compliance and down to make recommendations.
Has been reached on a set of theoretical and practical conclusions, including: -
1-confirmed the statistical analysis of the answers to the research sample the importance of the role o
... Show MoreNegotiation is considered as one of the most important kinds of communication in the contemporary organizations, which depend on the important role of managerial information systems in providing necessary and suitable information for success of the negotiation process.
Accordingly, this study aims at measuring the extent of the variables effect of managerial information system in the negotiation process.
To achieve this study, two hypotheses were chosen; the first is the correlation relation and the second is the effect, and statistical means represented by correlation coefficient "Spearman" and (R2) were used.
A Number of conclusions were
... Show More