Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
In this paper, we show that for the alternating group An, the class C of n- cycle, CC covers An for n when n = 4k + 1 > 5 and odd. This class splits into two classes of An denoted by C and C/, CC= C/C/ was found.
Praise be to God, Lord of the Worlds, and the best blessings and peace be upon our master Muhammad and all his family and companions, and those who follow them with goodness until the Day of Judgment. . And after:
God created man in the best manner, and subjugated the universe to him and favored him over the rest of creation when he gave him a mind to contemplate and know how to distinguish between the harmful and the beneficial, the bad and the good, in order to exploit him in achieving the meaning of worship, because it is the highest goal of his creation. God Almighty said (And I did not create the jinn and mankind. Except that they worship them.” [Al-Dhariyat: 56]
If knowing what is harmful from what is beneficial a
... Show MoreWork for public benefit (Community service) is a criminal punishment that restricts liberty. The convicted person performs an unpaid work for public benefit, The judge determine in the ruling the number of working hours and the period of completion within the limits set by the law. It is a new and unique punishment that involves punitive treatment outside the prison walls. It spawned of the necessities of rehabilitative justice to Confrontation the crisis of the punishment for deprivation of liberty for a short period (custody). The main aim of the work penalty for public benefit is to rehabilitate the convict to reintegrate him socially, which is the first rank among the aims of punishment under contemporary punitive policy. This punish
... Show MoreThe study of the characteristics of the heritage fabric is one of the important things in studies of conservation and rehabilitative use. There are three main elements of rehabilitation and they are considered the basis for achieving the rehabilitation process and these elements are (development, sustainability, participation) and that the first item addressed in the research is heritage and urban fabric in heritage areas where characteristics have been studied And a problem, while the second term is rehabilitation, where the concept of rehabilitation, the types and causes of the process of rehabilitation and the benefits and qualifications that affect the urban fabric that are represented (social, economic, religious and political) were
... Show MoreThe aim of the research is to find out the availability of the requirements of applying the indicators of school performance system in the public schools in Mahayel Asir educational directorate through the school planning indicator, the safety and security indicator, the active learning indicator, the student guidance indicator and determining the existence of statistically significant differences between the responses of the research community according to the variable of (scientific qualification - years of work as a principal - training courses). The questionnaire was used as a tool for data collection from the research community, which consists of all the public schools’ principals (n=180) Mahayel Asir educational directorate
... Show MoreOne of the most critical functions of the government is the devising and planning for the Public Budget for the coming years. Studying any budget of any given state would directly reflect on its intentions and collective direction during a certain time span. Since all allocations represent the government's agenda and time plan for coming years. And the size of each allocation would measure the priority of each budgetary item. Because of the eminent importance of the public budget planning in Iraq, a country of abundant riches and human resources that flow in the national economy, we present this research that would cover the resources versus expenditures of Iraq's public budget endured by the government to sustain its various sec
... Show MoreRecently, complementary perfect corona domination in graphs was introduced. A dominating set S of a graph G is said to be a complementary perfect corona dominating set (CPCD – set) if each vertex in is either a pendent vertex or a support vertex and has a perfect matching. The minimum cardinality of a complementary perfect corona dominating set is called the complementary perfect corona domination number and is denoted by . In this paper, our parameter hasbeen discussed for power graphs of path and cycle.
Clustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value