Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Aims: This study aims to compare patients’ complaints and problems of wearing complete dentures.
Methodology: The sample included 40 Iraqi patients who are wearing complete dentures from about five years ago. They
were selected randomly with a age range between (55–65) years. The questions asked to the patients were listed according
to the recent classification of post-insertion problems.
Result: The results showed that the percentage of patient's complaint from adaptation problems (62.1%) was higher than
looseness problems (61.3%) and discomfort problems (39.3%) as followed.
Recommendation: Dentists need thorough knowledge of anatomy, physiology, pathology and psychology. The assessing
of the psyche and emotions
For any group G, we define G/H (read” G mod H”) to be the set of left cosets of H in G and this set forms a group under the operation (a)(bH) = abH. The character table of rational representations study to gain the K( SL(2,81)) and K( SL(2, 729)) in this work.
In this study, a fast block matching search algorithm based on blocks' descriptors and multilevel blocks filtering is introduced. The used descriptors are the mean and a set of centralized low order moments. Hierarchal filtering and MAE similarity measure were adopted to nominate the best similar blocks lay within the pool of neighbor blocks. As next step to blocks nomination the similarity of the mean and moments is used to classify the nominated blocks and put them in one of three sub-pools, each one represents certain nomination priority level (i.e., most, less & least level). The main reason of the introducing nomination and classification steps is a significant reduction in the number of matching instances of the pixels belong to the c
... Show More|
One of the most powerful tools for any stellar dynamics is the N-body simulation. In an N-body simulation the motion of N particles is followed under their mutual gravitational attraction. In this paper the gravitational N-body simulation is described to investigate Newtonian and non- Newtonian (modified Newtonian dynamics) interaction between the stars of spiral galaxies. It is shown that standard Newtonian interaction requires dark matter to produce the flat rotational curves of the systems under consideration, while modified Newtonian dynamics (MOND) theorem provides a flat rotational curve and gives a good agreement with the observed rotation cu |
Background: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy
Catalase (EC 1.11.1.6) is a well known enzyme which exists in almost all living creatures exposing to oxygen (such as plants, bacteria, and animals). It is a very necessary enzyme to protect the cell from oxidative detriment by reactive oxygen species (ROS). The aim of this study is the partial purification and characterization of Catalase enzyme from Banana peels. In this study, fresh banana peels are treated with 70 % ethanol ,further separated with chloroform ,water and ethyl acetate respectively .The supernatant of the enzymatic sample which is treated with chloroform is loaded into gel filtration column with Sephadex G-100 (1.0 x 90 cm) equilibrated with pH7 buffer media (phosphate buffer 0.1 M). Kinetic studies of the purified en
... Show MoreIntroduction: The study was intended for Roseomonas gilardii NTCC 13290 strain pigment extraction and characterization. Methodology: The pigment-producing bacterial were cultured on Columbia blood agar and nutrient media agar. Then the pigments were extracted by ethanol. The candidate pigment was further characterized by different biotechnological techniques: UV-Vis spectroscopy, FT-IR to analyze the functional group of the targeted pigment, and TLC media. Results: The cultivation of Roseomonas gilardii on media showed pink color and nearly runny texture. The bacterial colonies were microscopically gram stained and examined, the R. gilardii was seen as coccobacillus colonies that mostly form pairs arranged as short chains. The R. gilardii b
... Show MoreThe synthesis of conducting polyaniline (PANI) nanocomposites containing various concentrations of functionalized single-walled carbon nanotubes (f-SWCNT) were synthesized by in situ polymerization of aniline monomer. The morphological and electrical properties of pure PANI and PANI/SWCNT nanocomposites were examined by using Fourier transform- infrared spectroscopy (FTIR), and Atomic Force Microscopy (AFM) respectively. The FTIR shows the aniline monomers were polymerized on the surface of SWCNTs, depending on the -* electron interaction between aniline monomers and SWCNTs. AFM analysis showed increasing in the roughness with increasing SWCNT content. The AC, DC electrical conductivities of pure PANI and PANI/SWCNT nanocomposite h
... Show MoreIn the South of yement, when the accupation of Aden in 1839 by the British, British politics has proceeded in accordance with interests in promoting the existence and exploitation of this important site to implement their interests. Historians believe that Britain played a major role in the conflicts that have taken place on the land of Yemen, through a series of military and political dealings between them and the Ottoman Empire prior to withdrawal of Yemen and between local authorities and power to Yemen, such interactions have led to very serious consequences for the future of Yemen and Yemen was often divided into three parts, the northern areas under the authority of Imam Yahya, and the South, under the control of Britain, Asir and
... Show MoreThe last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.