Background: Prostatic adenocarcinoma is the most widely recognized malignancy in men and the second cause of cancer-related mortality encountered in male patients after lung cancer.
Aim of the study: To assess the diagnostic value of diffusion weighted imaging (DWI) and its quantitative measurement, apparent diffusion coefficient (ADC), in the identification and localization of prostatic cancer compared with T2 weighted image sequence (T2WI).
Type of the study: a prospective analytic study
Patients and methods: forty-one male patients with suspected prostatic cancer were examined by pelvic MRI at the MRI department of the Oncology Teaching Hospital/Medical City in Baghdad
... Show MoreThe present paper is an experimental study to improve the productivity of the conventional solar still. This done by modifying conventional still in a way that the distilled basin is larger than distillation basin, thus providing an increase in the condensation surface and speeding up the condensation process. Moreover, increase in the dimensions of the distilled base helps coupling reflective panels to the distilled base to reflect incident solar radiation to the distillation basin. For this purpose , two solar stills were made, one conventional designand another made according to the proposed design. The two solar stills were tested during the period from February to July 2009 under varying weather conditions of Basra, Iraq (latitude o
... Show MoreIn this paper, a new equivalent lumped parameter model is proposed for describing the vibration of beams under the moving load effect. Also, an analytical formula for calculating such vibration for low-speed loads is presented. Furthermore, a MATLAB/Simulink model is introduced to give a simple and accurate solution that can be used to design beams subjected to any moving loads, i.e., loads of any magnitude and speed. In general, the proposed Simulink model can be used much easier than the alternative FEM software, which is usually used in designing such beams. The obtained results from the analytical formula and the proposed Simulink model were compared with those obtained from Ansys R19.0, and very good agreement has been shown. I
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023