<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.</p>
The study aimed to identify the news framing on the Israeli Arabic-speaking i24 channel of the Israeli aggression on Gaza -2021 by analyzing the channel’s Program “this evening”. The study used the media survey method, and in its framework, it relied on the content analysis method for the program’s episodes from May 5, 2021 AD until June 4, 2021 AD, with 22 episodes. The study showed the program’s interest in launching the Palestinian resistance’s rockets significantly, followed by the Israeli military operations, and the program’s reliance on correspondents largely as a source of news material related to the aggression. It also proved that a news report and a reporter's report was the most important form of presenting news
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
This paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MoreThis study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance
Background: Bone is essentially a highly vascular, living, constantly changing mineralized connective tissue. It is remarkable for its hardness, resilience and regenerative capacity, as well as its characteristic growth mechanisms. This study aimed to: 1. To evaluate the effect of bone morphogenetic protein7 (BMP7) on bone healing in artificially created intrabony defect in rabbits upper diastema, histologically. 2. To study the immunohistochemical expression of TGF-β3 and IGF-1R as bone formation markers in experimental and control groups during bone healing. Material and method: Forty male rabbits, was used in this study, 8 rabbits for each healing interval (3 days, 1,2 ,4 and 6 weeks). In each rabbit two bone holes were created on th
... Show MoreThe research aims to highlight on the behavioural approach in accounting, and clarify the behavioural implications of the main activities of accounting, and clarify the concept of information inductance within the framework of the behavioural approach and its impact on preparing financial statements. And that the impact of financial information on the behaviour of investment decision-makers, and to achieve the goals of the research, the researcher prepared a questionnaire according to Likert five-step scale, and he took into consideration in preparing it in line with the characteristics of the study community, and that the target community for this questionnaire is the investors in the Iraq Stock Exchange. The researcher reached
... Show MoreIn this paper we introduce the basic of definitions of groups for geometric figures; we describe some of geometric figures by using the properties of groups. The classification of some geometric figures by using the properties of some algebraic structures.
Let R be a commutative ring with identity, and W be a unital (left) R-module. In this paper we introduce and study the concept of a quasi-small prime modules as generalization of small prime modules.