A Photo Dynamic Therapy (PDT) is a technique which is used with Laser to treat many of cancer
tissues. This paper deals with the relatively new therapeutic technique (PDT) with pulsed Nd:glass Laser
which was applied to human soft tissues (Ovary and Kidney tissues), and to the hard tissues (freshly
extracted human teeth), with power density of 280 watt/mm2 and exposure time 330 usec. Different
dyes (Blue, methylene, eosin, and orange) were applied to the area before irradiation to study the effect
of the pigments on the laser interaction with biological tissues. The zone of treatment (Z-necrosis) with
aid of MATLAB was determined. The relationship of zone of treatment with exposure time,
accumulated damage and fraction of oxidative radicals was obtained.
In the current research, an eco-biosynthesis method for synthesizing silver nanoparticles (AgNPs) is reported using thymus vulgaris leaves (T. vulgaris) extracts. The optical and structural properties of the nanoparticles is determined using UV-visible, x-ray diffraction (XRD) and field emission scanning electron microscope (FESEM). In addition, the synthesis factors such as the temperature, the molar ratio of silver nitride and thymus vulgaris leaves extract have been investigated. The XRD pattern presented higher intensity for the five characteristic peaks of silver. FESEM images for same samples indicated that the particle size was distributed between 24-56 nm. In addition, it’s observed the formation of some aggregated Ag particles
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreRoller-Compacted Concrete (RCC) is a zero-slump concrete, with no forms, no reinforcing steel, no finishing and is wet enough to support compaction by vibratory rollers. Because the effectiveness of curing on properties and durability, the primary scope of this research is to study the effect of various curing methods (air curing, emulsified asphalt(flan coat) curing, 7 days water curing and permanent water curing) and different porcelanite (local material used as an Internal Curing agent) replacement percentages (volumetric replacement) of fine aggregate on some properties of RCC and to explore the possibility of introducing more practical RCC for road pavement with minimum requirement of curing. Cubes specimens were sawed from the slab
... Show MoreFinite Element Approach is employed in this research work to solve the governing differential equations related to seepage via its foundation's dam structure. The primary focus for this reason is the discretization of domain into finite elements through the placement of imaginary nodal points and the discretization of governing equations into an equation system; An equation for each nodal point or part, and unknown variables are solved. The SEEP / W software (program) is a sub-program of the Geo-Studio software, which is used by porous soil media to compensate for the problems of seepage. To achieve the research goals, a study was carried out on Hemrin dam, which located in the Diyala River 100 km northeast of Baghdad, Iraq. Thus, o
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More