Hair is an excellent indicator for abnormal concentration of toxic elements , In this study a random samples from girls hair of 12 cm long were irradiated by a flux of neutrons (4x10^ n/ cm^.s) obtained from an Am-Be neutron source of 5-Ci activitity . The y-ray activity measurements were carried out by using a " 5x5 " well- type Nal (Tl) detector. The study indicates clearly that the maximum concentration of elements was at about 7 cm hair length.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreBackground: The primary stability of the dental implant is a crucial factor determining the ability to initiate temporary implant-supported prosthesis and for subsequent successful osseointegration, especially in the maxillary non-molar sites. This study assessed the reliability of the insertion torque of dental implants by relating it to the implant stability quotient values measured by the Osstell device. Material and methods: This study included healthy, non-smoker patients with no history of diabetes or other metabolic, or debilitating diseases that may affect bone healing, having non-restorable fractured teeth and retained roots in the maxillary non-molar sites. Primary dental implant stability was evaluated using a torque ratc
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreIn the present study, Čech fuzzy soft bi-closure spaces (Čfs bi-csp’s) are defined. The basic properties of Čfs bi-csp’s are studied such as we show from each Čfs bi-csp’s (