AW Tarik, AW Ali T, A Salah, Journal of faculity of medicine Baghdad university, 2014 - Cited by 3
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreArchitecture has evolved through the ages as forms, relationships, materials and mechanisms according to the data of each era and up to the era of digital technology, where the change in proportions and aesthetic dimensions of contemporary architectural formation due to the capabilities of digitization has created innovative plastic properties using the void formation in the facades and the introduction of void as a formative and aesthetic element, which led to The emergence of new creative concepts and ideas that contradict traditional ideas and are consistent with the spirit of the times, led to a revolution in the world of architectural form at the level of (architectural ideas and the generation of shapes, materials and construction
... Show MoreThe presence of research Repositories in the intellectual production of universities and their availability through their websites or through their scientific institutions is one of the criteria for evaluating these universities in the international classifications of the best universities, in addition to preserving the intellectual output of these universities for a long time and safely and preserving the property rights of researchers. And made them available through their websites. The purpose of this research is to identify the concept of digital content and research repositories and its origin, and to indicate the importance of its existence through the websites of universities and their types, and to identify the research repositories
... Show MorePseudomonas aeruginosa is common gram negative rod – shaped bacterium, a species of considerable medical importance, P. aeruginosa is prototypical "multi drug resistant (MDR) Pathogen" that is recognised for its ubiquity, its intrinsically advanced antibiotic resistance mechanisms, and its associatation with serious illnesses – especially nosocomial infection such as ventilator – associated pneumonia and various sepsis syndromes. This study was conducted from March 2014 to July 2014, the patients were males and females. Total samples of 613 patients, selected from burns wards and general surgery wards, the samples were sending to teaching laboratories from the same hospital. The present study
... Show MoreBackground: Survey of the occlusion in population groups usually include in their objections the academic assessment of occlusal feature, the planning resources for public health treatment programmers, the comparison of different population and the screening of groups for orthodontic treatment. Likewise a thorough investigation of the occurrence of malocclusions among school–students would be of major importance in the planning of orthodontic treatment in the public dental health services. For this purpose it is necessary to have detailed information on the prevalence of individual malocclusion among boys and girls at different ages distributed regionally, and moreover, an analysis of the need for orthodontic treatment in the different sc
... Show MoreIn this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreABSTRACT Background: Dental caries is a most common social and intractable infectious disease in human. Saliva is critical for preserving and maintaining oral health and salivary elements had many effects on caries experience. Aim of study: This study was conducted to assess dental caries severity by age and gender and their relation to salivary zinc and copper among a group of adults aged (19-22) years. Materials and methods: After examination eighty persons aged 19-22 years of both gender. Caries severity was documented according to DMFS index. Stimulated salivary samples were collected and chemically analyzed under standardized condition to detect salivary elements zinc and copper. Concentrations of Zinc and copper were measured by using
... Show More