Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
Stemming is a pre-processing step in Text mining applications as well as it is very important in most of the Information Retrieval systems. The goal of stemming is to reduce different grammatical forms of a word and sometimes derivationally related forms of a word to a common base (root or stem) form like reducing noun, adjective, verb, adverb etc. to its base form. The stem needs not to be identical to the morphological root of the word; it is usually sufficient that related words map to the same stem, even if this stem is not in itself a valid root. As in other languages; there is a need for an effective stemming algorithm for the indexing and retrieval of Arabic documents while the Arabic stemming algorithms are not widely available.
... Show MoreIn this research the specifications of Iraqi drinking bottled water brands are investigated throughout the comparison between local brands, Saudi Arabia and the World Health Organization (WHO) for bottled water standard specifications. These specifications were also compared to that of Iraqi Tap Water standards. To reveal variations in the specifications for Iraqi bottled water, and above mentioned standards some quality control tools are conducted for more than 33% of different bottled water brands (of different origins such as spring, purified,..etc) in Iraq by investigating the selected quality parameters registered on their marketing labels. Results employing Minitab software (ver. 16) to generate X bar,
... Show MoreThe current research aims to identify measure classroom flexibility for kindergartens children, identify the correlation between the classroom flexibility of kindergartens children and the gender of the child, and identify the correlation between the classroom flexibility of kindergartens children and their classroom. The current research sample consisted of (200) boys and girls selected randomly from the governmental Riyadh affiliated with the six directorates of education of Baghdad on both sides (al-karkh - al-rasafa). in order to achieve the objectives of the current research, this required including two tools, one is the scale of classroom flexibility for the kindergartens' children, which was constructed by the researcher based on
... Show MoreIn this paper, we consider a two-phase Stefan problem in one-dimensional space for parabolic heat equation with non-homogenous Dirichlet boundary condition. This problem contains a free boundary depending on time. Therefore, the shape of the problem is changing with time. To overcome this issue, we use a simple transformation to convert the free-boundary problem to a fixed-boundary problem. However, this transformation yields a complex and nonlinear parabolic equation. The resulting equation is solved by the finite difference method with Crank-Nicolson scheme which is unconditionally stable and second-order of accuracy in space and time. The numerical results show an excellent accuracy and stable solutions for tw
... Show MoreThe researches to discover useful ways to represent the agents and agent-based
systems are continuous. Unified Modeling Language (UML) is a visual modeling language
used for software and non software modeling systems. The aim of this paper is: using UML
class diagram to design treasury pharmaceuticals agent and explain its internal action. The
diagram explains the movement of the agent among other nodes to achieve user's requests
(external) after it takes them. The paper shows that it is easy to model the practical systems by
using agent UML when they are used in a complex environment.
Objective: To compare the efficacy and safety of isosorbide mononitrate (IMN) versus misoprostol used to induce labour for overdue pregnancy.
Setting: A prospective randomized clinical study conducted at AL-Elwiya Maternity Teaching Hospital in Baghdad from Jan. 2008 to Dec. 2008.
Method: One hundred and fifty women with over due pregnancy (past date and posterm pregnancy) referred for induction of labour with Bishop scores <_ 5 were randomly allocated to receive either forty mg isosorbide mononitrate (IMN) tablet as a single vaginal dose (n=75) or fifty mcg misoprostol vaginally (n=75) every six hrs for a maximum of three doses. Amniotomy and/or oxytocin infusion is considered when Bishop scores frankly progressed (augmentation
This research discusses the procedural aspect of oil contracts, as one of them is the sharing in production contract which has the same importance comparing with other aspects, as the legislator, in oil countries, is requiring the availability of certain procedures to enter such oil contracts, related with high importance issues such as the followed procedures by the competent administration in that oil country to choose the company they deal with, also the required procedures to be done to enter negotiations with those companies for maintaining equal mutual interests for both parties. One of those needed procedures is to sign the contract by the competent entity stated by law, also the necessity to present such contract to
... Show MoreThe aim of this paper is to estimate a nonlinear regression function of the Export of the crude oil Saudi (in Million Barrels) as a function of the number of discovered fields.
Through studying the behavior of the data we show that its behavior was not followed a linear pattern or can put it in a known form so far there was no possibility to see a general trend resulting from such exports.
We use different nonlinear estimators to estimate a regression function, Local linear estimator, Semi-parametric as well as an artificial neural network estimator (ANN).
The results proved that the (ANN) estimator is the best nonlinear estimator am
... Show More