The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreCryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis
Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreThis paper exclusively deals with medical encounters. . Structurally and thematically, it manifests itself in five parts. The First part deals with medical encounters as well as essential speech activities which cover (a) frames (certain types of talk) (b) the patient’s account and the patient’s story or more precisely the patient telling his story and (c) the act of questioning the patient. The Second part revolves round genre and register. The former, in most cases, suggests that the format of medical encounters is conversational. With register; we have a converse reality that restrictively tries to narrow things and give them a certain flavor. The Third part realizes the technicalities of medical encounters (a) the setting of an inte
... Show MoreMost medical books and researches documented that increased body weight is a predisposing factor to hypertension , and there is recent work in this field as well. In this research , the relationships between hypertension and body weight with age were studied in Iraqi population . It is concluded that diastolic hypertension is separated from systolic and combined hypertension and increased body weight has little effect on increased blood pressure.
To find out a simple and efficient equation to estimate maize ear grain weight on farm (in situ), twenty three maize crosses along with two synthetics were grown in the field. On the experimental farm of the Dept. of Field Crop Sci., College of Agric., Univ. of Baghdad, seeds of twenty five maize genotypes were grown in the fall season of 2013 with three replicates. At dough stage of the kernels, five naked ears of each experimental units were measured for length and maximum diameter. This will sum up 125 ears of the trial. The volumes of ears were calculated as cylinder (length× r2× 3.1416). Grain weight of all ears were determined after harvesting and drying to 15% grain moisture. A constant was calculated by dividing ear grain weight b
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show MoreThis paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show MoreAutorías: Amwag Mohammed Ali Qasim, Ghassan Adeeb Abdulhasan. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 6, 2021. Artículo de Revista en Dialnet.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More