Preferred Language
Articles
/
ixZUJIwBVTCNdQwCUviO
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 15 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Extraction of Fish Oils and Used in Drugs Systems.: Extraction of Fish Oils and Used in Drugs Systems.
...Show More Authors

In this study was undertaken frish fish such as Bigeye Ilisha megaloptera, Nematalos nasus, Suboor Hilsha ilisha and Carp Cyprinus carpio. they were purchased from local marketes in Basrah, Oil was extracted by a solvent extraction method on low temperature. And the level of oil obtiened about (6.08; 10.72; 13.52 and 5.61)% for Bigeye, Jaffout, Suboor and Carp. the Crud oils were compared with vegetable oil (olive oil) and animal fat (tial fat mutton).
The extracted oil from fresh complete fishs with compared oils intraed on pharmacological system through packed in capsul with and with out garlic`s extract. this system analysis with chemical tests.
Results were analyzed statistically by using the SPSS program with using (CRD)

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
Lark
The Image of the Arab in Hebrew Literature for Young Adults – A Reading of the Novel “Nadia” by Kalila Ron Feder
...Show More Authors

يهدف هذا البحث الى التطرق الى صورة العربي كما يعرضها ادب اليافعين العبري في رواية " نادية " للكاتبة العبرية " كاليلا رون فيدر " . والتي تعد من الاديبات العبريات اللواتي تطرقن بصورة مباشرة الى موضوع ما خلف الجدار ، والصراع العربي – الإسرائيلي وانعكاساته على المجتمع الإسرائيلي بصورة عامة والمجتمع العربي بصورة خاصة . ينقسم هذا البحث إلى ثلاثة فصول، تطرق الفصل الأول  إلى "ادب اليافعين"، و تاريخه ، مميزاته والفئ

... Show More
View Publication
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Design and establishment of an implementation program to simulate the far field propagation for a Gaussian beam of x-ray laser
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 07 2021
Journal Name
Jordan Journal Of Biological Sciences
Evaluation of Quorum-Sensing, Antibiotics Resistance, and Biofilm Formation in Pathogenic Bacteria from the Hospital Environments
...Show More Authors

Abstract Background: Multidrug-resistant bacteria (MDR) often contaminate hospital environment and cause serious illnesses. Quorum Sensing (QS) regulates a variety of downstream cellular processes, including antibiotics resistance mechanisms and biofilm formation, and causes harm to the host. This study investigates antibacterial susceptibility and biofilm formation of pathogenic bacteria in hospital environment. Methods: Hundred bacterial isolates were collected from various environments in the Medical City hospital. The antimicrobial susceptibility technique was evaluated through disk diffusion method. Next, biofilms formation was detected by the microliter plate assay. Finally, PCR was used to analyze the frequency of QS system gene

... Show More
Preview PDF
Scopus (2)
Scopus
Publication Date
Sun Aug 10 2025
Journal Name
Central Asian Journal Of Medical And Natural Science
Microbial Load Comparison Between Clinical and Non-Clinical Student Environments in Al-Kindy College of Medicine
...Show More Authors

The environmental surfaces hygiene of college premises like classrooms play role in spreading different pathogenic bacteria, furthermore a Medical students are often potential vectors for resistant bacteria to their entourage. This study aimed to assess bacterial contamination and their susceptibility to various antimicrobial agents in the educational classroom of Al-Kindy College of medicine in two classrooms: one occupied by clinical visitor and non-clinical visitor students to evaluate and determine its health risk. In this cross-sectional study, different sites of the educational classroom of Al-Kindy College of medicine were studied.  Ninety-sex Different swab samples were collected from 8 different sites of college across bot

... Show More
View Publication
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Preparation and identification of oxidatin derivaties for Salts and acids of bile for medical uses
...Show More Authors

The purified prepared compounds were identified through different methods of identification i.e, I.R, UV-vi^ble-spectroscopy in addition to (coloured tests) Calculation of the sum of OH groups. TLC techniques were also used to test the purity and the speed ofthe rate of flow (RF).

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Ieee Access
Fuzzy-Based Ensemble Feature Selection for Automated Estimation of Speaker Height and Age Using Vocal Characteristics
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
The evolution of the press image in the Iraqi press (An analytical study of the pictures of the first page of Al-Sabah newspaper for the year)
...Show More Authors

This research sheds light on the development that has occurred on the use of press pictures in the Iraqi press by analyzing the form and content of the images used in (Al-Sabaah) newspaper for the 2012 model. The researcher's interest in this topic for what represented by the press picture of a way to highlight and attract the reader's attention to the substance journalist who represents the goals behind the newspaper publishing.

This research is divided into three sections. The first one dealt with the methodological framework of the research, and the second part addressed the aspect of press pictures and its history and technological development, while the third section devoted to the study of the development of the form and co

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Italian Journal Of Pure And Applied Mathematics
A NOTE ON STRONGLY FULLY STABLE BANACH ALGEBRA MODULES RELATIVE TO AN IDEAL
...Show More Authors

Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.

Scopus