Comparison is the most common and effective technique for human thinking: the human mind always judges something new based on its comparison with similar things that are already known. Therefore, literary comparisons are always clear and convincing. In our daily lives, we are constantly forced to compare different things in terms of quantity, quality, or other aspects. It is known that comparisons are used in literature in order for speech to be clear and effective, but when these comparisons are used in everyday speech, it is in order to convey the meaning directly and quickly, because many of these expressions used daily are comparisons. In our research, we discussed this comparison as a means of metaphor and expression in Russia
... Show Morewind load coefficient
Rheumatoid arthritis and periodontitis use analogous effector destructive procedures, in that the inflammatory cells and pro-inflammatory cytokines that drive chronic bone erosion in RA and chronic periodontal destruction in Periodontitis are alike. Periodontitis (PD) has appeared as a hazard factor in a number of health situations as rheumatoid arthritis (RA). To determine the effect of anti-tumor necrosis factor alpha biological treatment (methotrexate and Enbrel or infliximab) on periodontal status of patients having rheumatoid arthritis with periodontitis in comparison to those having periodontitis without rheumatoid arthritis and control healthy subjects and to determine the serum levels of anti-cyclic citrullinated peptide (ACCP) in t
... Show MoreArthropod-borne infections, known as vector-borne diseases, are a significant threat to both humans and animals. These diseases are transmitted to humans and animals through the bites of infected arthropods. In the last half century, there have been a number of unexpected viral outbreaks in Middle Eastern countries. Recently, Iraq has witnessed an outbreak of the Crimean-Congo Hemorrhagic Fever virus with high morbidity and mortality rates in humans. However, very little is known about the prevalence and distribution of CCHFV in Iraq, and therefore, it is impossible to quantify the risk of infection. CCHFV is transmitted to humans through the bite of infected ticks. However, transmission can also occur through contact with the blood or ti
... Show MoreSocial media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are
... Show MoreThe impact of decorating Fe, Ru, Rh, and Ir metals upon the sensing capability of a gallium nitride nanotube (GaNNT) in detecting chlorine trifluoride (CT) was scrutinized using the density functionals B3LYP and B97D. The interaction of the pristine GaNNT with CT was a physical adsorption with the sensing response (SR) of approximately 6.9. After decorating the above-mentioned metals on the GaNNT, adsorption energy of CT changed from −5.8 to −18.6, −18.9, −19.4, and −20.1 kcal/mol by decorating the Fe, Ru, Rh, and Ir metals into the GaNNT surface, respectively. Also, the corresponding SR dramatically increased to 39.6, 52.3, 63.8, and 106.6. This shows that the sensitivity of the metal-decorated GaNNT (metal@GaNNT) increased by in
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More