The work demonstrates the effect of cold atmospheric plasma (CAP) on adult female rats suffering from osteoporosis, the used plasma was generated by a floating electrode-dielectric barrier discharge system with an electrode diameter of 3 cm. The output power was from (12-20) watts. The effect of non-thermal plasma was observed on rats with various exposure times of 20, 30, and 40 sec. It was noted that the blood calcium percentage of animals exposed to cold plasma increased, as well as an increase in the level of vitamin D3 at the same time, it is noted that there is no effect on parathyroid hormone level. For the thyroid gland, it is noticed an increase in the level of T3, and T4 hormones in the blood during the period of induction for osteoporosis, and when exposed to cold plasma, a decrement was noticed in the level of the two hormones reached the normal level at the same time. There was no effect on thyroid-stimulating hormone and for periods of exposure in the female plasma, these results give an indication that cold plasma can be used to treat or reduce osteoporosis. Finally, the histopathology and energy dispersive x-ray anyalysis (EDX) analysis processes were done, This gives a positive indication for the use of cold plasma in the treatment of many bone-related diseases.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.
We have investigated the impact of laser pulse wavelength on the quantity of ablated materials. Specifically, this study investigated the structural, optical, and morphological characteristics of tungsten trioxide (WO3) nanoparticles (NPs) that were synthesized using the technique of pulsed-laser ablation of a tungsten plate. A DD drop of water was used as the ablation environment at a fixed fluence at 76.43 J/cm2 and pulse number was 400 pulses of the laser. The first and second harmonic generation ablations were carried out, corresponding to wavelengths of 1064 and 532 nm, respectively. The Q-switched Nd: YAG laser operates at a repetition rate of 1 Hz and has a pulse width of roughly 15 ns. These parameters are applicable to both wavelen
... Show MoreA new Schiff base o-hydroxybenzylidene-1-phenyl-2,3-dimethyl-4-amino-3-pyrazolin-5-on (HL) ,have been prepared and characterization.(HL) has been used as a chelating ligand to prepare a number of metal complexes VO(II) ,Cr(III) ,Mn(II),Fe(II),Hg(II) and UO2(II) .and mixed ligands complexes have been prepared between o-hydroxybenzylidene-1-phenyl-2,3-dimethyl-4-amino-3-pyrazolin-5-on and 8- hydroxy quinoline with VO(II),Zn(II),Cd(II), Hg(II) and UO2(II) the prepared complexes were isolated and characterized by (FT-IR)and (UV-Vis) spectroscopy. Elemental analysis (C.H.N) Chloride contents, Flame atomic absorption technique. in addition to magnetic susceptibility and conductivity measurement. Molar ratio measurement in solution gave comparabl
... Show MoreIn Production and Operations Management the specialists have tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.
The research aims to develop a blu
... Show More