<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.</p>
Dental clinicians and professionals need an affordable, nontoxic, and effective disinfectant against infectious microorganisms when dealing with the contaminated dental impressions. This study evaluated the efficiency of hypochlorous acid (HOCl) as an antimicrobial disinfectant by spraying technique for the alginate impression materials, compared with sodium hypochlorite, and its effect on dimensional stability and reproduction of details. HOCl with a concentration of 200 ppm for 5 and 10 min was compared with the control group (no treatment) as a negative control and with sodium hypochlorite (% 0.5) as a positive control. Candida albicans, Staphylococcus aureus, and Pseudomonas aeruginosa were selected to assess the antimicrobi
... Show MoreThe nephrotoxicity induced by methotrexate is a severe condition that greatly affects its therapeutic potential and has a significant inflammatory component. Fimasartan is an angiotensin receptor blocker that offers organ-protective effects and may be useful in mitigating renal injury. The present study explored the anti-inflammatory potential of two doses of fimasartan against methotrexate-mediated nephrotoxicity. Albino rats were intraperitoneally administered a single methotrexate (20 mg/kg). Intraperitoneal treatment with fimasartan (5 or 10 mg/kg/day) was initiated on day two after methotrexate injection and continued for seven consecutive days. Methotrexate significantly increased serum urea, creatinine, and NGAL concentrations. It al
... Show MoreThirty swabes of medical implants were collected from Al-Yarmouk's hospital which were cultured on manitole agar to isolate Staphelococcus aureus . Only four samples gave positive results with this media. It was used ten types of antibiotics to test the sensitivity of this bacterium against them. All isolates of S. aureus were recorded as multidrug resistant and were considered as MRSA. One pledge alternative therapy is the utilize of certain pure bacterocin MIC (32.5 to 62.5 μg/ml) and it was compared with vancomycin (200-400 μg/ml) with average of (8 – 15) mm diameter of inhibition zones recpectively. The first reduction of biofilm formation ability has been proved in catheters when treatedby pure bacterocin. The test shows the highes
... Show MoreThe main objective of this study is to examine the impact of moisture concrete of clayey soil on the concrete slabs placed directly over it. This experimental study presents the mechanical properties of the concrete slab when placed on different clayey soil moisture content ranging from 0% to the optimum moisture content of 35%. The tests were performed on soil concrete specimens of 25*30*50 mm exposed to sprayed water curing conditions for 28 days. Tests of compressive strength, ultrasonic pulse velocity, crack depth and crack width were investigated through this paper. An ejection relationship between compressive strength of concrete and water content in the soil was observed, with a 26% increase with water increasing from 0% to 35%. T
... Show MoreAbstract:
Objective: The study aim is to assess knowledge of secondary schools female students regarding dysmenorrhea; find out the effectiveness of education program on secondary schools students and also to identify relationship between education program and certain variables.
Methodology: The quasi-experimental design (pretest and posttest) on one hundred students 4th year in Khawla Bint Al-Azwar secondary school for females at morning shift in Al Nasiriya City, data collection started at 4th March to 18th March 2018. A non-probability (purposive) sample of (100) students (50) student from scientific branch and (50) students from literary branch. Data have been collected through using a questionnaire modeled and made up of
Background: Polishing technique for acrylic resin material have great effect on properties of acrylic material and bacterial colonization such as staphylococcus aurous, which are responsible for many acrylic prosthetic infections such as the commonly ocular infections. Ineffective polishing technique could affect roughness and subsequently porosity of acrylic materials.So, a new effective method for polishing acrylic was used depending on the use of optiglaze coating material. So, this study aimed to evaluate the effect of optiglaze polishing on porosity of acrylic resin material and staphylococcus aurous activity in comparison to conventional polishing technique.
Materials and methods: Specimen(n=120) were prepared :20 spe
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show More