This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreVarious speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show More<span lang="EN-GB">Transmitting the highest capacity throughput over the longest possible distance without any regeneration stage is an important goal of any long-haul optical network system. Accordingly, Polarization-Multiplexed Quadrature Phase-Shift-Keying (PM-QPSK) was introduced lately to achieve high bit-rate with relatively high spectral efficiency. Unfortunately, the required broad bandwidth of PM-QPSK increases the linear and nonlinear impairments in the physical layer of the optical fiber network. Increased attention has been spent to compensate for these impairments in the last years. In this paper, Single Mode Fiber (SMF), single channel, PM-QPSK transceiver was simulated, with a mix of optical and electrical (Digi
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThe shortage of irrigation water requires specific measures. One of these measures is the application of the rationing system (a period of irrigation followed by a period of drought). This system could have an effect on the behavior and properties of irrigation canals. So, studying rationing system on the irrigation canals is important both in civil engineering and water resources engineering, especially if these channels constructed with gypsum soil. This study includes the calculation of seepage velocity and water content in each cycle (10 days wetting and 10 days of drying). The model is built for this research contains four samples, two samples for untreated soil one of them expos
The aquatic crude extract of Silybum marianum dry grains prepared by melting them in distil water by the method of soak and shake. The effect of Silybum marianum crude extract studied in vitro on three tumor cell line the Hep-2, AMN-3 and RD for 24, 48 and 72 hours of exposure, and one cell line of normal cells REF for 72 hr exposure. The results showed that the prescence of toxic effect of the aquatic crude extract on the cell lines of Hep-2, AMN-3 and RD at 10 and 100 µg/ ml upto the higher concentrations when they exposed to the extract for 48 hr. as compared with the control treatment, and when the exposure period increased to 72 hr. the toxic effect started at low concentrations (5 and 10 µg/ ml) as compared with the control g
... Show MoreIn this study Isolated Pathogenic bacteria which causes Tonsillitis in Children with ages between 3-17 years. They are admitted to Central Children Hospital (Al-Karch) and Ebn-Albalady Hospital (Al-Rusafa). 200 cases were collected which include 120 Male and 80 Female. The result of the recent study shows that the isolation percentage was 40% from Male and 35% from Female. In this study Fifty six isolated were Identified, 20 were ?-hemolytic Streptococcus which was Streptococcus pyogenes, formed (36%) from all isolated.6 Pathogenic bacteria were ?- hemolytic Streptococcus which was Streptococcus pneumoniae formed (11%). The number of Moraxella catarrhalis bacteria was 12 formed (21%), the number of Haemophilus influenzae was 1
... Show More