Understanding the Progression of Bone Metastases to Identify Novel Therapeutic Targets
...Show More Authors
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MorePoly (3-hydroxybutyrate) (PHB) is a typical microbial bio-polyester reserve material; known as “green plastics”, which produced under controlled conditions as intracellular products of the secondary metabolism of diverse gram-negative/positive bacteria and various extremophiles archaea. Although PHB has properties allowing being very attractive, it is too expensive to compete with conventional and non-biodegradable plastics. Feasibility of this research to evaluate the suitability of using a watermelon-derived media as an alternative substrate for PHB synthesis under stress conditions was examined. Results, include the most nutrients extraction, indicated that the watermelon seeds contain a high content of nutrients makes them a promisi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAim: The reduction in the amount of marginal bone is the most important demand for the long term success of dental implants. This prospective clinical study was aimed to investigate the marginal bone loss of early loaded SLActive implants with different dimensions and surgical approaches. Materials and methods Fifteen patients aged from 18 to 60 years were divided into 2 groups (flapped and flapless approach) that underwent delayed implant placement protocol with SLActive implants. The marginal bone level was estimated by cone-beam computed tomography during three different periods: preoperatively, 8 weeks after surgery and 24 weeks after loading of the prosthesis. Results: The mean value of marginal bone level was not significantly chan
... Show MoreIn The Name of Allah Most Gracious Most Merciful
It is no secret to everyone that the endowment is an important nucleus for the prosperity of Islamic civilization, especially in the fields of education, health, economy, and defensive military actions that fall within the door of jihad, and so on. Al-Ashraf, Qom Al-Quds, Cairo, and other parts of the Islamic world. What we will see in the research.
The paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.
The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer
... Show MoreAvascular necrosis have always presented great challenges to orthopedic surgeons and patients, remain in many ways today the unsolved dilemma. Varieties of non-vascularized bone grafting techniques preceded by core decompression have been proposed with varying degrees of success. O bb j ee cc t i vv ee ss : The aim of this study is to review the the value of core decompression and non-vascularized tibial bone strip graft treatment for early stages of non-traumatic osteonecrosis stage II & III according to stein burg staging . M ee t hh oo dd ss : prospectively reviewed 26 patients (32 hips) with osteonecrosis of the femoral head between June 2006 and December 2013 at Imam Ali hospital in Sader city & Al-Wasity teaching hosp
... Show MoreThe aim of this research is to recognize the tasks undertaken by the headmasters of intermediate schools concerning time- administration, in accordance to the viewpoints of the headmasters of intermediate schools in the Administration of Education of Al-Karkh the Third. The sample of this research consists of (60) headmasters and &n
... Show More