User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.
Many people believe that diabetes appears after a psychological crisis, which is a misconception but it could be in them before having a crisis ore the crisis. But emotion increases the appearance of symptoms, and athletes are at risk of developing diabetes. Hypoglycemia is not unusual for athletes, and during physical activity the sugar level changes in the blood. Therefore, it is important to conduct tests for the measurement of sugar before and immediately after the activity, for the purpose of detecting the sharp drop in the sugar level and treating it, and the early detection is necessary to avoid the possibility of diabetes, the concept of psychological immunity in psychology is considered a positive concepts that maintain the balance
... Show MoreHas been studied both processes Almetzaz and extortion of a substance Alklanda Maysan different amounts of Alcaúlan Guy 70% alcohol solution using the method when the wavelength
Stereo lithography (SLA) three-dimensional (3D) printing process is a type of additive manufacturing techniques that uses digital models from computer-aided design to automatically produce customized 3D objects. Around 30 years, it has been widely utilized in the manufacturing, design, engineering, industrial sectors and its applications in dentistry for manufacturing prosthodontics are very important. The stereo lithography technology is highly regarded because it can produce items with excellent precision especially when selecting the best process parameters. This review article offers a useful and scientific summary of SLA three-dimensional printing technology and its brief history. The specific type of 3D printers which is SLA type b
... Show MoreOwing to their cost-effectiveness and the natural abundance of magnesium, magnesium-ion batteries (MIBs) were introduced as encouraging alternatives to Lithium-ion batteries. Following the successful synthesis of carbon nano-tube, its B and N doped derivatives which were doped with B and N enjoyed the attention of researchers as novel anode materials (AM) for MIBs. Here, we investigated a BC2N nano-tube (BC2NNT) as an encouraging AM for MIBs. To have a deeper understanding of the electrochemical properties, cycling stability, specific capacity (SC) and the adsorption behavior of this nano-tube, first-principles density functional theory computations were performed. By performing NMR calculations, we identified two types of non-aromatic hexa
... Show MoreStereo lithography (SLA) three-dimensional (3D) printing process is a type of additive manufacturing techniques that uses digital models from computer-aided design to automatically produce customized 3D objects. Around 30 years, it has been widely utilized in the manufacturing, design, engineering, industrial sectors and its applications in dentistry for manufacturing prosthodontics are very important. The stereo lithography technology is highly regarded because it can produce items with excellent precision especially when selecting the best process parameters. This review article offers a useful and scientific summary of SLA three-dimensional printing technology and its brief history. The specific type of 3D printers which is SLA t
... Show MoreIn this study a polymeric composite material was prepared by hand
lay-up technique from epoxy resin as a matrix and magnesium oxide
(MgO) as a reinforcement with different weight fraction (5,10,15,
and 20)% to resin. Then the prepared samples were immersed under
normal condition in H2So4(1 M) solution, for periods ranging up to
10 weeks. The result revealed that the diffusion coefficient
decreasing as the concentration of MgO increase. Also we studied
Hardness for the prepared samples before and after immersion. The
result revealed that the hardness values increase as the concentration
of MgO increase, while the hardness for the samples after immersion
in H2SO4 dec
Objective: The goal of this research is to load Doxorubicin (DOX) on silver nanoparticles coupled with folic acid and test their anticancer properties against breast cancer. Methods: Chitosan-Capped silver nanoparticles (CS-AgNPs) were manufactured and loaded with folic acid as well as an anticancer drug, Doxorubicin, to form CS-AgNPs-DOX-FA conjugate. AFM, FTIR, and SEM techniques were used to characterize the samples. The produced multifunctional nano-formulation served as an intrinsic drug delivery system, allowing for effective loading and targeting of chemotherapeutics on the Breast cancer (AMJ 13) cell line. Flowcytometry was used to assess therapy efficacy by measuring apoptotic induction. Results: DOX and CS-Ag
... Show MoreVehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that c
... Show More