Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreOne of the key molecules in the conversion of sphingosine to sphingosine-1- phosphate is SPHK-1, also known as Sphingosine Kinase 1 (SPHK-1). Sphingosine-1-phosphate (S1P) is a lipid that acts as a signaling molecule and plays an essential role in inflammatory and immunomodulatory responses. S1P has recently been identified as a mediator and a biomarker in inflammatory bone diseases such as osteoporosis and inflammatory osteolysis based on the biological effects of S1P in osteoclastic and osteoblastic cells and immune cells. According to recent research, S1P may play a role in the pathogenesis of periodontitis, an inflammatory bone-destructive condition. This study assesses the salivary level SPHK-1 in periodontitis and its correlat
... Show MoreAssessment of Salivary Macrophage Inflammatory Protein-1 Alpha Level in Different Stages of Periodontitis, Riyam Muthanna Muhammed*, Hadeel Mazin Akram
The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion sc
The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreThe aim of this study was to evaluate ovarian masses with conventional grey scale ultrasonography and colour Doppler flow imaging and to assess the diagnostic reliability of these methods in differentiating benign and malignant ovarian masses.
We assessed 56 patients with an ovarian mass. Morphological characterisation of the mass was performed utilising the Sassone score. Colour Doppler parameters were recorded for each patient, and the Caruso vascular score was also applied. The results were compared with surgical/pathological and/or follow-up scans.
Using the Sassone score, overall reliability in differentiating ovaria