Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
Summary:
OBJECTIVE Many associations have been found between specific HLA antigens and increased susceptibility to various diseases . So we tried to associate class I and class II antigens with acute lymphoblastic leukemia . We also demonstrate the presence of antibodies in serum of acute lymphoblastic leukemic patients against HLA class I.
DESIGN: Prospective study.
SETTING: Tissue typing and histocompatibility center at Al- Karamah Teaching Hospital. PATIENTS AND METHOD: 70 acute lymphoblastic leukemia patients from pediatric hospitals. HLA ( human leukocyte antigens) typing done for them by serological method and cross matching and blood grouping were also done for them.
RESULTS: there was significant difference between pa
Android OS is developing very fast, and because of being an open source OS, it is vulnerable to many problems that are manifested to users directly or indirectly. Poor application launch time is one of these problems. In this paper, a set of sixteen experiments is established to distinguish the factors that have the most evident effects on application launch time in Android mobiles. These factors are application, launch and kill, events, and storage. Mann Kendall (MK) test, one way analysis of variance (ANOVA), and Design of Experiment (DOE) are used to prove the influence of factors statistically. As a result of the experiments, the application factor, especially the third party applications level, has the most prominent effects on appl
... Show MoreMany neuroscience applications, including understanding the evolution of the brain, rely on neural cell instance segmentation, which seeks to integrate the identification and segmentation of neuronal cells in microscopic imagery. However, the task is complicated by cell adhesion, deformation, vague cell outlines, low-contrast cell protrusion structures, and background imperfections. On the other hand, existing segmentation approaches frequently produce inaccurate findings. As a result, an effective strategy for using the residual network with attention to segment cells is suggested in this paper. The segmentation mask of neural cells may be accurately predicted. This method is built on U-net, with EfficientNet serving as the e
... Show MoreLet L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.
The study evaluates the incidence of inferior alveolar nerve injuries in mandibular fractures, the duration of their recovery, and the factors associated with them. Fifty-two patients with mandibular fractures involving the ramus, angle, and body regions were included in this study; the inferior alveolar nerve was examined for neurological deficit posttraumatically using sharp/blunt differentiation method, and during the follow-up period the progression of neural recovery was assessed. The incidence of neural injury of the inferior alveolar nerve was 42.3%, comminuted and displaced linear fractures were associated with higher incidence of inferior alveolar nerve injury and prolonged recovery time, and recovery of inferior alveolar nerve fun
... Show MoreThe purpose of this paper is to solve the stochastic demand for the unbalanced transport problem using heuristic algorithms to obtain the optimum solution, by minimizing the costs of transporting the gasoline product for the Oil Products Distribution Company of the Iraqi Ministry of Oil. The most important conclusions that were reached are the results prove the possibility of solving the random transportation problem when the demand is uncertain by the stochastic programming model. The most obvious finding to emerge from this work is that the genetic algorithm was able to address the problems of unbalanced transport, And the possibility of applying the model approved by the oil products distribution company in the Iraqi Ministry of Oil to m
... Show MoreThis paper deals with constructing a model of fuzzy linear programming with application on fuels product of Dura- refinery , which consist of seven products that have direct effect ondaily consumption . After Building the model which consist of objective function represents the selling prices ofthe products and fuzzy productions constraints and fuzzy demand constraints addition to production requirements constraints , we used program of ( WIN QSB ) to find the optimal solution
In this paper, new concepts which are called: left derivations and generalized left derivations in nearrings have been defined. Furthermore, the commutativity of the 3-prime near-ring which involves some
algebraic identities on generalized left derivation has been studied.