COVID-19 is a unique viral infectious illness that causes a variety of symptoms and health hazards, particularly to the respiratory system and has been declared a worldwide pandemic. The disease is characterized by a cytokine release in severe conditions. Interleukin-6 (IL-6), a proinflammatory cytokine, mediates an important immunomodulatory process. Also, vitamin D was identified to have a role in the innate immunity of individuals. Our study was designed to find the role of IL-6 and vitamin D in COVID-19 patients, as well as, to see whether there is a link between vitamin D deficiency and cytokine syndrome development. The study included 90 COVID-19 patients and 30 control people from Baghdad, Iraq. The age of the participants was non-s
... Show MoreSome new norms need to be adapted due to COVID-19 pandemic period where people need to wear masks, wash their hands frequently, maintain social distancing, and avoid going out unless necessary. Therefore, educational institutions were closed to minimize the spread of COVID-19. As a result of this, online education was adapted to substitute face-to-face learning. Therefore, this study aimed to assess the Malaysian university students’ adaptation to the new norms, knowledge and practices toward COVID-19, besides, their attitudes toward online learning. A convenient sampling technique was used to recruit 500 Malaysian university students from January to February 2021 through social media. For data collection, all students
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreArtificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection
... Show MoreBackground and Purpose: Coronavirus has posed an unfamiliar threat to the world. Despite such circumstances, Malaysians continue to stay optimistic by keeping abreast with updates and mostly by seeking refuge in hopeful and consoling messages shared by fellow citizens. This study identified Facebook postings with positive messages, posted by Malaysians during the Movement Control Order (MCO) implemented by the Malaysian government as a form of prosocial behaviour. Methodology: Through an analytic framework consisting of Positive Discourse Analysis and Critical Discourse Analysis, 15 Facebook postings related to COVID-19 were selected and identified as positive discourse, which were coded and categorised using a thematic analysi
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More