<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.</p>
Background: Male infertility is a global concern and it tends to increase due to miscellaneous factors, such as environmental toxins and genetic and lifestyle choices. The aryl hydrocarbon receptor (AHR) has recently attracted attention due to its involvement in male infertility mechanisms and impact on sperm production and function. AHR, a versatile receptor expressed in various tissues, including the testes, regulates the genes involved in spermatogenesis. AHR activation is associated with cell cycle regulation and chromatin condensation during spermatogenesis. Objectives: This study aimed to investigate the influence of AHR activation on blood-testis barrier (BTB) integrity, focusing on the role of tight junction protein-1 (TJP1)
... Show MoreThe importance of specifying proper aggregate grading for achieving satisfactory performance in pavement applications has long been recognized. To improve the specifications for superior performance, there is a need to understand how differences in aggregate gradations within the acceptable limits may affect unbound aggregate base behavior. The effects of gradation on strength, modulus, and deformation characteristics of high-quality crushed rock base materials are described here. Two crushed rock types commonly used in constructing heavy-duty granular base layers in the State of Victoria, Australia, with three different gradations each were used in this study. The gradations used represent the lower, medium, and upper gradation li
... Show MoreFilms of pure polystyrene (ps) and doped by bromothymol blue material with percentages(4%) prepared by using casting technique in room temperature , the absorption and transmission spectra has been recorded in the wavelength rang (200-900)nm and calculated refractive index , reflectivity, real and imaginary parts of dielectric constant and extinction coefficient . this study has been done by recording the absorption and transmission spectra by using spectrophotometer .
The inhibitory action of four lactobacilli isolates Lactobacillus bulgaricus, L. acidophilus, L. plantarum and L. fermentum, isolated from four different samples; yoghurt, vinegar, saliva and vagina respectively, on Escherichia coli and Staphylococcus aureus adhesion to uroepithelial cells were investigated. Results showed that all Lactobacillus isolates or their supernatant were able to reduce the number of the uropathogens attached to uroepithelial cells. However, inhibition level of lactobacilli cells was higher than their supernatant. Nevertheless, the human indigenous lactobacilli (L. fermentum and L. plantarum) were more competitive than food lactobacilli (L. acidophilus and L. bulgaricus).
Objectives: to compare health of mothers and neonatal among age groups, to find out the correlation between
age groups and mother and neonatal health.
Methodology: A descriptive study was carried out at delivery rooms of three teaching hospitals in Baghdad city
from Feb. 28th through May. 28th
, 2013. A purposive (non-probability) sample of 300 laboring women was selected
from delivery rooms categorized into three groups, group 1 (≤19) years, group 2 their age between (20-35) years
old and group 3 their age (≥35) years. The data were collected through the use of constructing questionnaire, an
interview technique with mothers and reviewing their medical records as means of data collection; The
questionnaire con
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More