Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard version ZC4.5 is used. From obtained results, we noticed that AES-method is faster than RSA and takes less memory size, but RSA is more secure
than AES, since it uses two different keys instead of one as in AES.
Backgr ound: The transfer of the tibialis posterior tendon to the anterior aspect of the ankle not only replaces the function of the paralyzed muscles, but also removes the deforming force on the medial aspect of the foot. Objecti ves: In this study, we evaluated patients who underwent tibialis posterior tendon transfer for the treatment of foot drop, and comparison through interosseous membrane route versus anterior to lower tibia route of tibialis posterior tendon transfer, with evaluation of the results according to carayon criteria Methods: Nine patients with foot drop secondary to different causes treated with tibialis posterior tendon transfer from January 2011 to January 2012 were followed up for a mean of 12 months in Al Kindy Teach
... Show MoreBac kground: The transfer of the tibialis posterior tendon to the anterior aspect
of the ankle not only replaces the function of the paralyzed muscles, but also
removes the deforming force on the medial aspect of the foot.
Objec t i ves : In this study, we evaluated patients who underwent tibialis
posterior tendon transfer for the treatment of foot drop, and comparison through
interosseous membrane route versus anterior to lower tibia route of tibialis
posterior tendon transfer, with evaluation of the results according to carayon
criteria
Methods: Nine patients with foot drop secondary to different causes treated with
tibialis posterior tendon transfer from January 2011 to January 2012 were
followed up for a
Objective: Assess type 2 diabetic patients’ knowledge regarding preventive measures of diabetic foot. Find out the relationship between of type 2 diabetic patients’ knowledge regarding preventive measures of diabetic foot with certain sociodemographic characteristics
Methodology: A descriptive study was carried out from (2nd January 2022 to 26th March 2022). A non –probability (purposive) sample of (60) adult patients who are diagnosed with type2 diabetes mellitus these patients have met the study criteria which was selected from Imam AL-Hussein Medical-City. The study instrument consist of two section: (Demographic Information Sheet, and Foot Care Outcome Expectation
... Show MoreThis study aims to highlight the role of strategic leadership in adopting the intelligent organization model. The study was conducted on 7 economic organizations in Algeria. The study population consisted of 354 leaders, of whom a random sample of 176 leaders (managers, department heads, division heads, engineers) was selected. The researcher used a questionnaire as the main tool of the study. Statistical analysis and hypothesis testing were conducted using SEM (Structural Equation Modeling) with the aid of SPSS.v26 and AMOS.v24 software. The study concluded with a set of results, most notably: there is a statistically significant direct positive effect between strategic leadership and building intelligent organizations at a significance le
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreBackground: Arthrogryposis Multiplex congenita is a
rare disorder, characterized by multiple joint deformities
i.e. multiple congenital contractures, with shapelessly
cylindrical limbs and absent skin creases.
Club foot can be the only obvious deformity of this
widespread disorder.
Objective: To assess the most frequent recurrent
deformity after extensive soft-tissue release operations for
arthrogrypotic club foot and its appropriate treatment
regarding combined tendon transfer and bony operations.
Methods: A retrospective study of 14 patients with
arthrogrypotic club foot (28 feet), had been operated on by
multiple soft tissue and bony operations and followed in a
period between January (1993) till
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.