Background: The oral cavity is considered as a complex ecological niche, its complex microbial community is reflected to it. Streptococcus mutans has been implicated as one of the major etiological factor of dental caries. Tooth surfaces colonized with Streptococcus mutans are at a higher risk for developing caries, while lactobacilli are considered as the secondary invaders, not initiators of the carious lesion. The main purpose of this study was to correlate the dental caries (for primary and permanent teeth) in the upper jaw with the streptococcus mutans and lactobacilli count in the dental plaque and saliva, also to correlate the dental caries (for primary and permanent teeth) in the lower jaw with the streptococcus mutans and lactobaci
... Show MoreRecently, several concepts and expressions have emerged that have often preoccupied the world . around the concept of environment and sustainability. This is due to the negative and irresponsible impact of man and his innovations in various industrial and technological fieldsthat have damaged the natural environment. Architecture and cities at the broader level are some of the man made components that caused these negative impacts and in the same time affected by them. What distinguishes architectural and urban projects is the consumption of large . quantities of natural resources and production larger amounts of waste and pollution, along the life of these projects. At the end of the twentieth century and the beginning of the twenty-fir
... Show MoreThe study involved the effectiveness of Iraqi attapulgite (IQATP) clay as an environmentally friendly material that easily adsorbs brilliant green (BG) dye from water systems and is identified by various complementary methods (e.g., FTIR, SEM‐EDS, XRD, ICP‐OES, pHpzc, and BET), where the result reported that the IQATP specific surface area is 29.15 m2/g. A systematic analysis was selected to evaluate the impact of different effective adsorption performance variables on BG dye decontamination. These variables included IQATP dosage (0.02–0.8 g/L), solution pH (3.05–8.15), contact time (ranging from 2 to 25 min), and initial BG dye concentration from 20 to 80 mg/L. The parameter
... Show MoreBlockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and
... Show MoreDifferent ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach
Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show More