A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear feedback shift-register(LFSR) is a widely used tool for generating cryptographic sequences like Galois, Fibonacci. In this paper authentication system is designed using the specified brain waves which are Gamma and Betta wave’s features in order to generate the user authenticated sequence using Galois LFSRs.
Background: Lymphoblastic lymphomas (LBL) are neoplasms of precursor T cells and B cells, or lymphoblasts. The term lymphoblastic lymphoma has been used to describe predominantly lymph node– based disease; however, clinical distinction between LBL and acute lymphoblastic leukemia (ALL) has been arbitrary and has varied among different studies and institutions
Objectives: To determine the frequency of LBL among all Non-Hodgkin’s lymphoma (NHL) patients in children and to study the clinical and pathological features of LBL and assess the treatment outcome.
Methods: A retrospective study included 28 children with newly diagnosed LBL (based on morphology) below the age of 14 years over 8 years period from J
Coumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity
Urban Development refers to many topics such as: increased population density, city size, and individual’s production, distribution of technology and the growth of commercial, industrial and service professions. Such development is linked to the coordination of social and cultural trends in order to achieve social progress and economical prosperity. Knowledge as a topic now is known as intellectual capital wich led to upgrae the concept of urban development to be extended into many fields of knowledge, for example, cultural, social and human development to move the level of community culture into a new better standard.
The research adopted the urban transformation based on knowledge as an important factor in gr
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreMultiple sclerosis (MS) is one of an autoimmune condition with uncertain etiopathology. According to new data, ABO system had played a role in the development and understanding numerous diseases. Lower level of 25-hydroxy vitamin D3 (25-OHD3) is considered as a risk factor for MS. The aims of this study is to identify the role of blood group distribution on the levels of parathyroid hormone (PTH), 25-OHD3, total calcium, inorganic phosphorus and total magnesium on MS patients. Additionally, we assessed the relation between Expanded Disability Status Scale (EDSS) and study parameters in patients. The Study included 107 patients with MS were distributed in to four groups according to their blood group (A, B, AB, and O). Additi
... Show MoreElliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encodi
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreBackground: Klebsiella oxytoca is a Gram-negative rod-shaped bacterium that is becoming resistant to multiple drugs and is frequently endangering patients' lives. It is a member of the human microbiota.
Objectives: To assess the value of identifying K. oxytoca using an automated diagnostic system (VITEK-2) as compared to traditional manual methods.
Materials and Methods: A total of 136 clinical specimens were collected from patients in Baghdad hospitals during a period from July to November 2022. VITEK-2 system was used to recognize the isolated bacteria to the genus and species level. The biochemical indole test was used as a confirmatory test at
... Show MoreThe current study primarily aims to develop a dictionary system for tracing mobile phone numbers for call centers of mobile communication companies. This system tries to save the numbers using a digital search tree in order to make the processes of searching and retrieving customers’ information easier and faster. Several shrubs that represent digits of the total phone numbers will be built through following the phone number digits to be added to the dictionary, with the owner name being at the last node in the tree. Thus, by such searching process, every phone number can be tracked digit-by-digit according to a required path inside its tree, until reaching the leaf. Then, the value stored in the node, that rep
... Show More