The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreBackground: Male infertility is a global concern and it tends to increase due to miscellaneous factors, such as environmental toxins and genetic and lifestyle choices. The aryl hydrocarbon receptor (AHR) has recently attracted attention due to its involvement in male infertility mechanisms and impact on sperm production and function. AHR, a versatile receptor expressed in various tissues, including the testes, regulates the genes involved in spermatogenesis. AHR activation is associated with cell cycle regulation and chromatin condensation during spermatogenesis. Objectives: This study aimed to investigate the influence of AHR activation on blood-testis barrier (BTB) integrity, focusing on the role of tight junction protein-1 (TJP1)
... Show MoreDifferent parameters of double pipe helical coil were investigation experimentally. Four coils were used; three with a curvature ratio (0.037, 0.031, and 0.028) and 11mm diameter of the inner tube while the fourth with 0.033 curvature ratio and 13 mm diameter of the inner tube. The hot water flow in the inner tube whereas the cold water flows in the annulus. The inlet temperatures of hot and cold water are 50 0C and 18 0C respectively. The inner mass flow rate ranges from 0.0167 to 0.0583 kg/s. The results show the Nusselt number increase with increase curvature ratio. The Nusselt number of the coil with 0.037 curvature ratio increases by approximately 12.3 % as compare with 0.028 curvature ratio. The results also r
... Show MoreIn this paper, the effect of temperature on the charge transfer rate of dye (N3) in contact with ZnS semiconductors is discussed and studied when electrons move from the excited N3 dye to the conduction band of ZnS based on quantum shift theory. In a heterogeneous system, the energy levels are assumed to be continuous, and the N3-ZnS system is surrounded by a variety of polar solvent media. The transition energy of the N3/ZnS heterojunction was calculated using seven different solvents at room temperature, considering the refractive index and dielectric constant of the solvents and the ZnS semiconductor, respectively. The charge-transport reaction rate was calculated over different te
The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to resul
... Show MoreTwo unsupervised classifiers for optimum multithreshold are presented; fast Otsu and k-means. The unparametric methods produce an efficient procedure to separate the regions (classes) by select optimum levels, either on the gray levels of image histogram (as Otsu classifier), or on the gray levels of image intensities(as k-mean classifier), which are represent threshold values of the classes. In order to compare between the experimental results of these classifiers, the computation time is recorded and the needed iterations for k-means classifier to converge with optimum classes centers. The variation in the recorded computation time for k-means classifier is discussed.
Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c
... Show MoreThis paper included derivative method for the even r power sums of even integer numbers formula to approach high even (r+2) power sums of even integer numbers formula so on we can approach from derivative odd r power sums of even integer numbers formula to high odd (r+2) power sums of even integer numbers formula this derivative excellence have ability to used by computer programming language or any application like Microsoft Office Excel. Also this research discovered the relationship between r power sums of even integer numbers formula and both formulas for same power sums of odd integer numbers formula and for r power sums of all integer numbers formula in another way.