The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an investigation of information security techniques in medical imaging, focusing on security goals. Encrypting a message before hiding them gives an extra layer of security, and thus, will provide an excellent solution to protect the sensitive information of patients during the sharing of medical information. Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly used to store and transmit medical images. The main objective of this study is to provide a general idea of what Least Significant Bit-based (LSB) steganography techniques have achieved in medical images.
Deposits with the Industrial Bank, together with loans received from others, are non-financial financial resources, which are sources of supply to the Industrial Bank of funds that allow the Bank to expand the granting of loans. The increases in this resource indicates that the bank is practicing comprehensive banking, which is consistent with the nature of the transformation of the banking system towards multiple businesses. Therefore, the research comes to highlight the causality of the trend between total deposits and total loans. And if the causality is found, is it one-way or two-way? How long is the impact?
This research is qualitative in nature. It aims to investigate descriptively, analytically, and comparatively the modern AK model represented by the Sudan Open University Series, and the European framework, the common reference for Teaching Foreign Languages, to uncover what was achieved in them in terms of communication and language use. Accordingly, an integrated, multi-media approach has been adopted to enable the production and reception activities, and the spread of Arabic in vast areas of the world. Such a spread helps Arabic language to be in a hegemonic position with the other living languages. The study is based on getting benefit from human experiences and joint work in the field of teaching Arabic to non-Arabic speakers to mee
... Show MoreAthletics are different from other games as a competition between individuals to show their competence and physical ability to achieve new record numbers in the various activities and various between the boards, jumping and throwing and each type of these activities in particular performance so found the researcher to find the method of training resistors in the development of special power and achievement In the effectiveness of javelin, where the researchers chose the sample of the athletes from the specialized school of athletics to effectively throw the spear at the ages of 15-17 years and carried out the tests of the research, which includes the strength of the speed of the arms and explosive power and The various resistance exercise
... Show MoreGoal of research is to investigate the impact of the use of effective learning model in the collection of the fourth grade students/Department of physics in the material educational methods and the development of critical thinking .to teach this goal has been formulated hypothesis cefereeten zero subsidiary of the second hypothesis .To investigate the research hypothesis were selected sample of fourth-grade students of the department of physics at the univers
... Show MoreThis work includes the synthesis and identification of ligand {3-((4-acetylphenyl)amino)-5,5-dimethylcyclohex2-en-1-one} (HL* ) by the treatment of 5,5-dimethylcyclohexane-1,3-dione with 4-aminoacetophenone under reflux. The ligand (HL* ) was identified via FTIR, Mass spectrum, elemental analysis (C.H.N.), 1H and 13C-NMR spectra, UV-Vis spectroscopy, TGA and melting point. The complexes were synthesized from ligand (HL* ) mixed with 3-aminophenol (A) and metal ion M(II), where M(II) = (Mn, Co, Ni, Cu, Zn and Cd) at alkaline medium to produce complexes of general formula [M(L* )(A)] with (1:1:1) molar ratio. These complexes were detected via FT-IR spectra, UV-Vis spectroscopy as well as elemental analysis (A.A) and melting point, conductivit
... Show MoreThis research sheds light on the morphological structure of nouns and verbs in the novel "ASTONISHMENT" by the novelist Aharon Applefield by analysing selected models from the novel in a morphological analysis in order to identify the most important morphological features of this structure according to a statistical analytical approach.
The morphological structure is the main pillar of the linguistic structure of the literary text. Morphology is the science that studies the word, by which its structure and original letters are known, and the change that has occurred to it. The aesthetics of the fictional text is reflected in this structure, through which the writer conveys his ideas and narrations to the reader. The research
... Show MoreThis study measures the indicators of social and environmental performance of the contents of the administration's prepared reports on its social and environmental performance by comparing the actual performance with the indicators set within the standards of the Global Reports Initiative (GRI), In preparing this research, the researchers relied on studying the criteria of the Global Reporting Initiative, which aims to achieve a high level of performance disclosure under sustainability, In light of contemporary global trends towards achieving sustainable development and its disclosure and the orientations of economic institutions and units in different countries towards emphasizing the extent of commitment during practicing its a
... Show MoreRepresent choices Behaviorism available to the Managerial leaders one of the prerequisites to run any beginnings of a psychological or dilemmas Managerial barriers to working in the field of work has been varied these options until it had taken several kinds of which contributed to the left different impacts on the alleviation of these problems, which prompted the researcher to raising the problem of study within the framework of questionable content how to contribute to that shown by Choices Behaviorism accredited to the Managerial leaders in the management of frustration
... Show MoreAbstract:
The aim of the present research is to evaluate the child’s nutritional
method (2-5 years old) which is based on his resistance of the food highly rich
with nutritional elements and his acceptance of the food of a low nutritional
value in addition to his having forbidden food with other mates and making
use of all mates when having food, in establishing the sound social values and
affection since child hood. The required statistical equation have been used
by the researcher namely (Z test).
The sample of the present study consists of (26) children who were selected
intentionally and randomly from the kindergartens of Al-Bayaa region and the
college of Education for women. The questionnaires were d
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More