Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Microbial water disinfection with UV rays is a universal technology. Disinfection is a method used to treat drinking water. This can be accomplished using physical and/or chemical processes. Physical Methods: Heating and UV rays are two main methods - UV rays to destroy cells and kill bacteria. The physical process generally gives drinking water an instant purification without producing harmful substances. However, there is no pollution in the water to ensure continuous cleaning. This study’s primary goal is to obtain environmentally safe drinking water in situations of water shortages and homes that lack clean water. Therefore, resort to appropriate home treatment. Therefore, an ex
Discrete Krawtchouk polynomials are widely utilized in different fields for their remarkable characteristics, specifically, the localization property. Discrete orthogonal moments are utilized as a feature descriptor for images and video frames in computer vision applications. In this paper, we present a new method for computing discrete Krawtchouk polynomial coefficients swiftly and efficiently. The presented method proposes a new initial value that does not tend to be zero as the polynomial size increases. In addition, a combination of the existing recurrence relations is presented which are in the n- and x-directions. The utilized recurrence relations are developed to reduce the computational cost. The proposed method computes app
... Show MoreAnise and thyme crude extract were used to prepare a lotion for topical application due to their antimicrobial, germicidal and antifungal effects. Two formulas were prepared using the mentioned natural plants, formula 2 (selected lotion) was the most acceptable one which contained veegum and xanthan gum as suspending agents in addition to other exceipients providing it good properties with high physical stability because of its flocculating, pouring, resuspending easily with sedimentation volume (F) 0.96. In addition to unchangeable odor and color with expiration date of one year. While the Preliminary clinical study was done using this lotion on 10 patients with infecious viral skin diseases, it was found that this lotion was successful
... Show MoreFor any group G, we define G/H (read” G mod H”) to be the set of left cosets of H in G and this set forms a group under the operation (a)(bH) = abH. The character table of rational representations study to gain the K( SL(2,81)) and K( SL(2, 729)) in this work.
The research aims to investigate the effects of GMAW or MIG welding process on the mechanical properties of dissimilar aluminum alloys 2024-T351 and AA 6061- T651. A series of experimental techniques have been conducted to evaluate mechanical properties of the alloys, by carrying out hardness, tensile and bending tests for welded and un-welded specimens.
Metal inert gas (MIG) has been carried out on sheet metal using ER- 4043(AlSi5) as a filler metal and argon as shielded gas. The welded joints were tested by X-ray radiography and Faulty pieces were excluded.
Welding joints without defects are subjected to heat treatment including heating the joints in furnace to 170 °C for half an hour then air cooling to rel
... Show MoreImproving the ability of asphalt pavement to survive the heavily repeated axle loads and weathering challenges in Iraq has been the subject of research for many years. The critical need for such data in the design and construction of more durable flexible pavement in bridge deck material is paramount. One of new possible steps is the epoxy asphalt concrete, which is classified as a superior asphalt concrete in roads and greatly imparts the level of design and construction. This paper describes a study on 40-50 penetration graded asphalt cement mixed with epoxy to produce asphalt concrete mixtures. The tests carried out are the Marshall properties, permanent deformation, flexural fatigue cracking and moisture damage. Epoxy asphalt mixes perf
... Show MoreBroyden update is one of the one-rank updates which solves the unconstrained optimization problem but this update does not guarantee the positive definite and the symmetric property of Hessian matrix.
In this paper the guarantee of positive definite and symmetric property for the Hessian matrix will be established by updating the vector which represents the difference between the next gradient and the current gradient of the objective function assumed to be twice continuous and differentiable .Numerical results are reported to compare the proposed method with the Broyden method under standard problems.