The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an investigation of information security techniques in medical imaging, focusing on security goals. Encrypting a message before hiding them gives an extra layer of security, and thus, will provide an excellent solution to protect the sensitive information of patients during the sharing of medical information. Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly used to store and transmit medical images. The main objective of this study is to provide a general idea of what Least Significant Bit-based (LSB) steganography techniques have achieved in medical images.
Abstract:
The research aims to shed light on the Corona pandemic and its repercussions on the global economy in general, and on the activities of Iraqi economic units in particular. It also aims to show the impact of the auditor’s reporting on the effects of the Corona pandemic on economic units and its reflection on the quality of his reporting. To achieve the objectives of the research, the researcher prepared a questionnaire according to the five-point Likert scale and took into account in its preparation compatibility with the characteristics of the study community, and that the target community for this questionnaire are the economic units listed in the Iraq Stock Exchange that have complet
... Show MoreTumor necrosis factor-alpha (TNF-α) antagonists’ therapy are expensive and has a non-responsive rate between 30% to 40% in rheumatoid arthritis patients. Genetic variation plays a vital role in the responsiveness to this type of therapy.The aim of this study is to investigate if the presence of genetic polymorphism in the TNF-α gene promoter region at locations -376 G/A (rs1800750), -806 C/T (rs4248158), and -1031 T/C (rs1799964) affects rheumatoid arthritis patient's tendency to be a non-responder to etanercept.
Eighty RA patients on etanercept (ETN) for at least six months were recruited from the Rheumatology Unit at Baghdad Teaching Hospital. Based on The European League Against Rheumatism response (EULAR) criteria, patient
... Show MoreHydrochloric acid (HCl) is a substance that is frequently utilized in industrial operations for important tasks such as chemical cleaning and pickling metallic surfaces.Therefore, the corrosion inhibition ability of three newly synthesized quinazoline derivatives namely, 3-allyl-2-(propylthio) quinazolin-4(3H)-one) (APQ), (3-allyl-2-(allylthio) quinazolin-4(3H)-one) (AAQ), (3-allyl- 2-( Prop -2-yn -1-ylthio) Quinazolin - 4 (3H) - one) (AYQ) were theoretically determined and these compounds were characterized using Fourier Transform Infra-Red (FTIR) and 1H and 13C Nuclear Magnetic Resonance (NMR) spectroscopic. A series of quantum chemical properties of these derivatives: EHOMO, ELUMO, energy gap (ΔE),dipole moment (μ), hardness (η), soft
... Show MoreYoung people represent the power and cornerstone of societies and their superiority is linked to their well-being. Their empowerment is as essential as the heart to the body, if it is corrupt, then the whole body is corrupt, and vice versa. The exposure to extremism and pressure from their families leads to violent acts and crimes for obtaining money through unknown organized bodies. This will drive them to fail in their life in an attempt to fulfill their most basic needs, which they have been deprived of by their families, the government, and other institutions. Therefore, governments should provide job opportunities for young people and provide entertainment centers, sports clubs, and family education centers that raise awareness of s
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreThe research aims to shed light on the concept of Visibal management and its reflection on the organizational culture of the organization. The visual administration is a modern administrative method that contributes to the renewal and development of the organization's reality through surveying the opinions of a sample of 61 employees in the R & D / Ministry of Higher Education and Scientific Research. (130) individuals. The questionnaire was used as a main tool for collecting data and information, and their answers were analyzed using the SPSS program in data entry and analysis. The most important tools are computational circles, standard deviations, method of analysis and regression equation. There is a possibility to apply
... Show MoreThe woman represents an existential dualism with the man along history. This existence has been manifested through the history of Art starting from the arts of the old civilizations until modernism. It must be said that the history of Art refers to her presence as an extension for this history in the oriental arts, and the Arab countries including Iraq. The woman has varying outputs in terms of the content of her presence and the style of presentation. In her characterizations: maternity, fertility, femininity and others. The Iraqi artists adopted these fields among them the artist Jaber Alwan who formulated his style of presentation and its units depending on the feminine presence and his experience in her formal and stylistic fie
... Show MoreAbstract
Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it
... Show MoreTV medium derives its formal shape from the technological development taking place in all scientific fields, which are creatively fused in the image of the television, which consists mainly of various visual levels and formations. But by the new decade of the second millennium, the television medium and mainly (drama) became looking for that paradigm shift in the aesthetic formal innovative fields and the advanced expressive performative fields that enable it to develop in treating what was impossible to visualize previously. In the meantime, presenting what is new and innovative in the field of unprecedented and even the familiar objective and intellectual treatments. Thus the TV medium has sought for work
... Show More