Preferred Language
Articles
/
kBfIvY0BVTCNdQwCkxqE
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key, secondly selected the block number and slice number, thirdly, the low-high band used for embedding after adding the generated number, fourthly, used the Hessenberg transform on the blocks that portioned the band (low-high) in a specific size. The secret information (image or text) is a binary value. It was embedded by setting the positive value in the diagonal to odd values if the embedded is one and setting it to even if the secret bit is zero. Several tests were applied, such as applying mean square error, peak signal to noise ratio PSNR, and structural similarity index measure SSIM. Some analyses such as adding noise, scaling, and rotation analysis are applied to test the efficiency. The results of the tests showed the strength of the proposed method.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Sex Variations by Linear Measurements of Palatal Bones and Skull Base Using 3D Reconstructed Computed Tomographic Scan among Iraqi Sample
...Show More Authors

Background: The skull base and the hard palate contain many anatomical features that make them rich in information which are useful in sex differentiation; in addition to that they have the ability to resist the hardest environmental conditions that support them in making sex differentiation. Three dimensional computed tomographic techniques has important role in differentiation between sex since it offers images with very accurate data and details of all anatomical structures with high resolution. This study was made to study sex variations among Iraqi sample by craniometric linear measurements of the hard palate and the skull base using 3D reconstructed Computed Tomographic scan. Materials and methods: This study composed of 100 Iraqi su

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Combination of FDM 3D Printing and Compressed Tablet for Preparation of Baclofen as Gastro-Floating Drug Delivery System (Conference Paper )#
...Show More Authors

This study aimed to develop an oral drug delivery system for gastro-retentive sustained drug release of baclofen by using a 3D printed capsular device since baclofen has a short half-life of 2.5 to 4 hours and has a narrow absorption window. Firstly sustained-release tablets of baclofen were formulated through the hot-melt extrusion of various thermoplastic polymers and direct compression of the extrudate, then a capsular device was designed and 3D printed to contain two air pockets to enable floating of the device and has four windows for drug release.

3D printing of the capsular device was done by an FDM printer using biodegradable PLA filament, and the sustained release tablets were inserted into the device to allow the medici

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
A study of Fermi hole and partial Fermi hole for Li- and C-Atoms in different states 1s 2p, 1s 3p, 1s 3d and 2s 2p
...Show More Authors

The electron correlation effect for inter-shell have been analysed in terms of Fermi hole and partial Fermi hole for Li-atom in the excited states (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). Fermi hole Δf(r12) and partial Fermi hole Δg(r12 ,r1) were determined in position space. Each plot of the physical properties in this work is normalized to unity. The calculation was performed using Mathcad 14 program.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Flow injection analysis for the photometric determination of promethazine-HCl in pure and pharmaceutical preparation via oxidation by persulphate using Ayah 3SX3-3D solar micro photometer
...Show More Authors

The first flow injection spectrophotometric method is characterized by its speed and sensitivity which have been developed for the determination of promethazine-HCl in pure and pharmaceutical preparation. It is based on the in situ detection of colored cationic radicals formed via oxidation of the drug with sodium persulphate to pinkish-red species and the same species was determined by using homemade Ayah 3SX3-3D solar flow injection photometer. Optimum conditions were obtained by using the high intensive green light emitted diode as a source. Linear dynamic range for the absorbance versus promethazine-HCl concentration was 0-7 mmol.L-1, with the correlation coefficient (r) was 0.9904 while the percentage linearity (r2%) was 98.09%. the L.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Sensors
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
A noval SVR estimation of figarch modal and forecasting for white oil data in Iraq
...Show More Authors

The purpose of this paper is to model and forecast the white oil during the period (2012-2019) using volatility GARCH-class. After showing that squared returns of white oil have a significant long memory in the volatility, the return series based on fractional GARCH models are estimated and forecasted for the mean and volatility by quasi maximum likelihood QML as a traditional method. While the competition includes machine learning approaches using Support Vector Regression (SVR). Results showed that the best appropriate model among many other models to forecast the volatility, depending on the lowest value of Akaike information criterion and Schwartz information criterion, also the parameters must be significant. In addition, the residuals

... Show More
View Publication Preview PDF
Scopus
Publication Date
Wed Dec 23 2020
Journal Name
Iraqi Journal Of Agricultural Sciences
THE TAXONOMICAL SIGNIFICANT OF COMPUTERD PHYLOGENETIC ANALYSIS AND MORPHOLOGICAL DATA IN SOME SPECIES OF POLYGONACEAE
...Show More Authors

This research dealt with study of cladistics taxonomy of  five  species related to the genus Rumex L. and Polygonum L. from family polygonaceae in Iraq by using Mesquite software V.2.75. This  research support strongly delimiting  the species P. aviculare L. and P. lapathifolia L.as suggested in floras publication while R. dentatus L. is setted in single group whereas R. vesicarius L. and R. conglomeratus Murray were included in the same group. Also, this study involved characteristics of shape, dimensions, color, and ornamentation of seeds and fruits as  the seed forms were ranging from lenticular to trigonous. In terms of size calculations,  the seeds of R. vesicarius  was recorded the higher range (4.0- 4.5) mm in length w

... Show More
Publication Date
Thu Nov 16 2017
Journal Name
Joiv : International Journal On Informatics Visualization
Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment
...Show More Authors

The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA – ECDH)
...Show More Authors

      Big data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However

... Show More
View Publication Preview PDF
Crossref (2)
Crossref