The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an investigation of information security techniques in medical imaging, focusing on security goals. Encrypting a message before hiding them gives an extra layer of security, and thus, will provide an excellent solution to protect the sensitive information of patients during the sharing of medical information. Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly used to store and transmit medical images. The main objective of this study is to provide a general idea of what Least Significant Bit-based (LSB) steganography techniques have achieved in medical images.
Some genetic factors are not only involved in some autoimmune diseases but also interfere with their treatment, Such as Crohn's disease (CD), Rheumatoid Arthritis (RA), ankylosing spondylitis (AS), and psoriasis (PS). Tumor Necrosis Factor (TNF) is a most important pro-inflammatory cytokine, which has been recognized as a main factor that participates in the pathogenesis and development of autoimmune disorders. Therefore, TNF could be a prospective target for treating these disorders, and many anti-TNF were developed to treat these disorders. Although the high efficacy of many anti-TNF biologic medications, the Patients' clinical responses to the autoimmune treatment showed significant heterogeneity. Two types of TNF receptor (TNFR); 1 an
... Show MoreMulti-belled piles are piles with enlarged ends; these piles have one or further bells at the lower third part of the pile. These piles are suitable for many soils with problems such as softening clay, the variation of groundwater table, expansive soils, black cotton soil, and loose sand. The current study reviewed the behavior of belled piles in multi-layer soils subjected to axial compression and pullout loading. The review covered the experimental and theoretical works on belled piles in multi-layered soils. These piles were subjected to static and dynamic loadings in compression and pullout cases. Most theoretical results focused on software such as PLAXIS 3D. The axial load applied on the piles comes from the upper
... Show MoreNeurogenic inflammation is pivotal in dental pulp repair, involving complex interactions between sensory nerves, immune cells, and dental pulp stem cells (DPSCs). This review aimed to identify the favorable pathways of neurogenic inflammation and neurogenic differentiation of DPSCs in the pulpal healing process. Also, to identify the techniques used to evaluate these inflammatory and differentiation processes. Both PubMed and Google Scholar databases were employed in the search strategy using keyword combinations based on MeSH terms. The search was performed for published articles in English from January 2014 to November 2024, including studies with histological and molecular findings. 29 articles only met the inclusion criteria. Neurogenic
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreError control schemes became a necessity in network-on-chip (NoC) to improve reliability as the on-chip interconnect errors increase with the continuous shrinking of geometry. Accordingly, many researchers are trying to present multi-bit error correction coding schemes that perform a high error correction capability with the simplest design possible to minimize area and power consumption. A recent work, Multi-bit Error Correcting Coding with Reduced Link Bandwidth (MECCRLB), showed a huge reduction in area and power consumption compared to a well-known scheme, namely, Hamming product code (HPC) with Type-II HARQ. Moreover, the authors showed that the proposed scheme can correct 11 random errors which is considered a high
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreAn experimental analysis was included to study and investigate the mass transport behavior of cupric ions reduction as the main reaction in the presence of 0.5M H2SO4 by weight difference technique (WDT). The experiments were carried out by electrochemical cell with a rotating cylinder electrode as cathode. The impacts of different operating conditions on mass transfer coefficient were analyzed such as rotation speeds 100-500 rpm, electrolyte temperatures 30-60 , and cupric ions concentration 250-750 ppm. The order of copper reduction reaction was investigated and it shows a first order reaction behavior. The mass transfer coefficient for the described system was correlated with the aid of dimensionless groups as fo
... Show MoreIn the present work, a z-scan technique was used to study the nonlinear optical properties, represented by the nonlinear refractive index and nonlinear absorption coefficients of nanoparticles cadmium sulfide thin film. The sample was prepared by the chemical bath deposition method. Several testing were done including, x-ray, transmission and thickness of thin film. z-Scan experiment was performed at two wavelengths (1064 nm and 532 nm) and different energies. The results showed the effect of self-focusing in the material at higher intensities, which evaluated n2 to be (0.11-0.16) cm2/GW. The effect of two-photon absorption was studied, which evaluated β to be (24-106) cm/GW. In addition, the optical limiting behavior has been studied.
... Show MoreIn order to take measures in controlling soil erosion it is required to estimate soil loss over area of interest. Soil loss due to soil erosion can be estimated using predictive models such as Universal Soil Loss Equation (USLE). The accuracy of these models depends on parameters that are used in equations. One of the most important parameters in equations used in both of models is (C) factor that represents effects of vegetation and other land covers. Estimating land cover by interpretation of remote sensing imagery involves Normalized Difference Vegetation Index (NDVI), an indicator that shows vegetation cover. The aim of this study is estimate (C) factor values for Part of Baghdad city using NDVI derived from satellite Image of Landsat-7
... Show Morein this paper, the current work was devoted to the manufacture of TiO2 nanoparticles doped with manganese, synthesis by the sol-gel technique using a dip-conting device, for their hydrophilic properties and photocatalytic activity, and the products were characterized by X-ray diffraction, scanning electron microscopy, and Uv-Visible absorption, and the results XRD showed an phase Anatase , and the results of the SEM Explained the shape of the morphology of the samples after the doping process compared with pure TiO2, and the results of a shift in light absorption from ultraviolet rays to visible light were evident. The results showed that the thin films have a high wettability under visible rays
... Show More