Background:SARS-CoV-2 infection has caused a global pandemic that continues to negatively impact human health. A large group of microbial domains including bacteria co-evolved and interacted in complex molecular pathogenesis along with SARS-CoV-2. Evidence suggests that periodontal disease bacteria are involved in COVID-19, and are associated with chronic inflammatory systemic diseases. This study was performed to investigate the association between bacterial loads of Porphyromonas gingivalis and pathogenesis of SARS-CoV-2 infection. Fifty patients with confirmed COVID-19 by reverse transcriptase-polymerase chain reaction, their age ranges between 20-76 years, and 35 healthy volunteers (matched accordingly with age and sex to th
... Show MoreIn accordance with epidemic COVID-19, the elevated infection rates, disinfectant overuse and antibiotic misuse what led to immune suppression in most of the population in addition to genotypic and phenotypic alterations in the microorganisms, so a great need to reevaluate the genetic determinants that responsible for bacterial community (biofilm) has been raised. A total of 250 clinical specimens were obtained from patients in Baghdad hospitals and streaked on Mannitol salt agar medium. The results revealed that 156 isolates appeared as round yellow colonies, indicating that they were mostly identified as Staphylococcus aureus from 250 specimens. The antibiotic resistance pattern of the isolates for methicillin 37.17% (n=58), Amoxic
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreIn these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso
... Show MoreThis study deals with the role of compensation system in improving the quality of educational services (University of Halabja as a Model) also our problem was the following question ; What is the role of compensation system in its different dimensions in improving the quality of educational services? And what is the relationship and impact of using the dimensions of the compensation system to improve the quality of educational services? The hypothesis of the research included the correlation and the impacts between the compensation system and its combined variables in the quality of educational services. This was proved through a field study and the distribution of questionn
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP