In their cross-sectional study, Al-Rubaye et al studied the extent of vitamin D (VD) deficiency/ insufficiency, factors affecting its degree, and the adverse outcomes of the altered VD status among a group of mothers and their neonates from Baghdad, Iraq. They found that 96.6% of the mothers had VD deficiency/ insufficiency compared to 86.4% in their neonates. Maternal VD levels and neonatal weights were significantly correlated with neonatal VD levels. We believe that the study results need to be revised. This is based two points listed in this letter to editor
Developing smart city planning requires integrating various techniques, including geospatial techniques, building information models (BIM), information and communication technology (ICT), and artificial intelligence, for instance, three-dimensional (3D) building models, in enabling smart city applications. This study aims to comprehensively analyze the role and significance of geospatial techniques in smart city planning and implementation. The literature review encompasses (74) studies from diverse databases, examining relevant solutions and prototypes related to smart city planning. The focus highlights the requirements and preparation of geospatial techniques to support the transition to a smart city. The paper explores various aspects,
... Show MoreIn this work, metal oxide nanostructures, mainly copper oxide (CuO), nickel oxide (NiO), titanium dioxide (TiO2), and multilayer structure, were synthesized by the DC reactive magnetron sputtering technique. The effect of deposition time on the spectroscopic characteristics, as well as on the nanoparticle size, was determined. A long deposition time allows more metal atoms sputtered from the target to bond to oxygen atoms and form CuO, NiO, or TiO2 molecules deposited as thin films on glass substrates. The structural characteristics of the final samples showed high structural purity as no other compounds than CuO, NiO, and TiO2 were found in the final samples. Also, the prepared multilayer structures did not show new compounds other than th
... Show MoreThe CuInSe2 (CIS) nanocrystals are synthesized by arrested precipitation from molecular precursors are added to a hot solvent with organic cap- ping ligands to control nanocrystal formation and growth. CIS thin films deposited onto glass substrate by spray - coating, then selenized in Ar- atmosphere to form CIS thin films. PVs were made with power conversion efficiencies of 0.631% as -deposited and 0.846% after selenization, for Mo coated, under AM 1.5 illumination. X-ray diffraction (XRD) and energy dispersive spectroscopy (EDS) analysis it is evident that CIS have the chalcopyrite structure as the major phase with a preferred orientation along (112) direction and the atomic ratio of Cu : In : Se in the nanocrystals is nearly 1 : 1 : 2
The taxonomy of Ficus L., 1753 species is confusing because of the intense morphological variability and the ambiguity of the taxa. This study handled 36 macro-morphological characteristics to clarify the taxonomic identity of the taxa. The study revealed that Ficus is represented in the Egyptian gardens with forty-one taxa; 33 species, 4 subspecies and 4 varieties, and classified into five subgenera: Ficus Corner, 1960; Terega Raf., 1838; Sycomorus Raf., 1838; Synoecia (Miq.) Miq., 1867, and Spherosuke Raf.,1838; out of them seven were misidentified. Amongst, four new Ficus taxa were recently introduced to Egypt namely: F. lingua subsp. lingua Warb. ex De Wild. & T. Durand, 1901; F. pumila L., 1753; F. rumphii Blume, 1825, and F. su
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show MoreBackground: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More