Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard version ZC4.5 is used. From obtained results, we noticed that AES-method is faster than RSA and takes less memory size, but RSA is more secure
than AES, since it uses two different keys instead of one as in AES.
Audio security is an important aspect in various areas of communication. This paper deals with audio encryption as many of the data communication depends on audio data. In this paper, a new proposal of audio encryption system has been introduced. The system can be divided into two phases, the first phase focuses on generating a high-quality Pseudo Random Number generator (PRNGs) using elementary, periodic and hybrid rules of cellular automata (CA). The system suggests a new combination of CA rules in an endeavor to provide high randomness and to improve the strength of the proposed cryptosystem. Whereas the second phase produces the Enhanced Rivest Cipher 5 (ERC5) algorithm which employs the generated Random Number Sequence (RNS) i
... Show MoreDiabetic foot ulcer (DFU) is one of the chronic wound infection and leads to non-traumatic lower limb amputation. Advances in diabetes research are significant and much needed because diabetes is on the rise worldwide and is considered by some experts already to be at an epidemic level. Among diabetic patients 70% were males and 30% were females. Aerobic bacteria 104(82%) were the most frequently isolated than anaerobic bacteria 23(18%). Among aerobes Gram negative bacteria 67(64.4%) were more commonly isolated than Gram positive 37(35.5%). The three most frequently found that S. aureus 28(22%) followed by P. mirabilis 22(17.3%) then E. coli 14(11%). Among anaerobic bacteria Gram negative bacteria 16(69.5%) were predominantly isolated th
... Show MoreBackground: - Diabetic foot infections may be classified as superficial or deep. Bacteria are liable to enter any cut or ulcer causing infection. Defect in treatment of infected deep diabetic foot may result in oesteomyelitis, limb loss, and even death.
Methods: - Microorganisms were isolated and identified from both superficial & deep foot ulcers infection of (60) diabetic patients.
Results: - The present results showed that high incidence (30.8%) of Escherichia coli (E-coli) was isolated from dry - superficial foot ulcers followed respectively by Staphylococcus epidermidis (S. epidermidis). 3.1 % and 15.4% of Proteus mirabilis (P. mirabilis), equal Percentages for Klebsiellae Pneumoniae (K. pneum
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.
In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency
... Show MoreIntroduction: Diabetic foot infections are one of the most severe complications of diabetes. This study was aimed to determine the common bacterial isolates of diabetic foot infections and the in vitro antibiotic susceptibility then treatment.
Methods: A swab was taken from the foot ulcer, and the aerobic bacteria were isolated and identified by cultural, microscopic and biochemical test, then by api-20E system. After that their antibiotic susceptibility pattern was determined. Then local and systemic treatment was used to treat the diabetic foot patients.
Results: Bacterial isolates belonging to twelve species were obtained from diabetic foot patients. Gram (-) bacteria were the predominant pathogens in the diabetic foot infection
Background: Congenital club foot is a complex deformity of foot .It is a collection of different abnormalities, with different etiologies. Consequently, Severity varies with difficulties in evaluating treatment strategies with outcome results. The treatment of congenital club foot remains controversial. Usually, the orthopedist's goal is to obtain anatomically and functionally normal feet in all patients. Objective: To asses short term follow up result of conservatively treated club feet in relation to the age
... Show MoreObjective: The aim of the study is to assess the personal hygiene of adult patients with
diabetic foot.
Methodology: ٨ descriptive study was carried out in Baghdad teaching hospital, Al-Karama teaching hospital
and Al-Kindey teaching hospital for the period of 10/1/2006 to 1/9/2006. A purposive "non probability" sample
of (100) patient.
Questionnaire was constructed for achieving the purpose of the study. Data were collected through the
application of the questionnaire and interview technique. Data were analyzed through descriptive statistical
approach (frequency & percentage) and inferential statistical approach (chi-square ع correlation) by using of
SPSS.
Results: The study results indicated that the ra
Objective: The aim of the study is to assess the personal hygiene of adult patients with
diabetic foot.
Methodology: A descriptive study was carried out in Baghdad teaching hospital, Al-Karama teaching hospital
and Al-Kindey teaching hospital for the period of 10/1/2006 to 1/9/2006. A purposive "non probability" sample
of (100) patient.
Questionnaire was constructed for achieving the purpose of the study. Data were collected through the
application of the questionnaire and interview technique. Data were analyzed through descriptive statistical
approach (frequency & percentage) and inferential statistical approach (chi-square & correlation) by using of
SPSS.
Results: The study results indicated that the
Background: Outcome of management of patients with diabetic foot is difficult to predict. Assessment of variables in history , examination and investigations were analyzed with outcome of management and whether can be assigned as prognostic factors .
Methods: prospective study of 300 patients with diabetic foot in Baghdad teaching hospital during the period from April 2000 to March 2004,certain criteria was taken in history and examination, these were investigated and treated either by conservative procedure or amputation.
Results: most common age group was 50-59 years ( 33.3%). The male to female ratio was 2:1. Conservative debridement was performed in ( 60%) of patients while amputation was employed in&nb