RA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe study dosage ethanol in the total content of acid sialic TC and acid sialic associated fat (LBSA) in blood serum and congener brain Dkor Jerd eggs study included dosage 20 animals of male rat Ald ethanol daily for a period of four weeks and concentrations 20% and 30%, 40%, 50% and size of dose 5mlThe results of the study showed that levels of TSA homogeneous in the brain and blood serum significantly reduced Ankhvaza
The study is designed to evaluate the effect of the aqueous extract of the P. lanceolata plant, as well as to know the effect of the drug CCl4 on the formation of micronucleus in vivo 48 female albino mice. In the study mice were separated into eight groups treated intraperitoneally for seven day first group Negative control, second positive control( CCl4 0.02%), third group aqueous extract (250 mg/kg), fourth group aqueous extract (500 mg/kg), fifth group (CCl4 0.02%) plus aqueous extract (250 mg/kg), sixth group (CCl4 0.02%) plus aqueous extract (500 mg/kg), seventh group aqueous extract (250 mg/kg) plus (CCl4 0.02%), and eighth group aqueous extract (500 mg/kg) plus (CCl4 0.02%). The genetic-cellular asp
... Show MoreImmunosuppressive cytokines are the main components of the tumor microenvironment and perform a vital function in controlling the immune response to malignant neoplasms.The objective: to study the influence of interleukin-4 (IL-4) and transforming growth factor-β3 (TGF-β3) on the development of breast tumors in women.Materials and methods. The concentration of cytokines IL-4 and TGF-β3 in blood serum was determined in 40 women with benign breast tumors, 40 women with malignant breast tumors, and 40 healthy patients without breast pathology, who were included in the control group.Breast cancer (BC) patients were divided into two groups; the first group included patients with the II stage of BC, who were considered to have a low le
... Show MoreIn this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.
This paper presents a new and effective procedure to extract shadow regions of high- resolution color images. The method applies this process on modulation the equations of the band space a component of the C1-C2-C3 which represent RGB color, to discrimination the region of shadow, by using the detection equations in two ways, the first by applying Laplace filter, the second by using a Kernel Laplace filter, as well as make comparing the two results for these ways with each other's. The proposed method has been successfully tested on many images Google Earth Ikonos and Quickbird images acquired under different lighting conditions and covering both urban, roads. Experimental results show that this algorithm which is simple and effective t
... Show MoreWe propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The threshold value and region of interest are discerned using operator input and Otsu algorithm. Novel brain slices image division is introduced via angular and distance span vectors of sizes 24˚ with 15 pixels. Rotation invariance of the angular span vector is determined. An automatic image categorization into normal and abnormal brain tissues is performed using Support Vector Machine (SVM). St
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More