Introduction: An aneurysmal bone cyst are enigmatic lesionof unknown cause and presentation and are difficult todistinguish from other lesions, it is a benign, but expansibletumor like lesion that generally occurs in the long bones. Ananeurysmal bone cyst arising from the flat bone like clavicleis rare .Case presentation: We report a 12-year-old girl child with ananeurysmal bone cyst of the lateral third of left clavicletreated with enblock resection. The pathologic findingsconfirmed the diagnosis of aneurysmal bone cyst. Thepatient has been followed up for one year with no evidenceof recurrence .Conclusion: En bloc resection can be curative and provide good results for this rare type of clavicle tumour.
The study aims to develop the awareness of the criteria for judging electronic educational materials among students of educational qualification at Dhofar University over spreading the Corona pandemic through a program based on mini-educational units. The study was applied to (18) students studying Teaching diploma at Dhofar University for the academic year 2020-2021, and their number. They were chosen intentionally. The study resulted in reaching a list of criteria for judging electronic educational materials, roughly (18) criteria in the selection themes and (15) criteria in the use theme. The level of awareness of the sample members with the criteria for selecting and using electronic educational materials and the effectiveness of the
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreThe Cenomanian – Turronian sedimentary succession in the south Iraq oil fields, including Ahmadi, Rumaila, Mishrif and Khasib formations have undergone into high-resolution reservoir-scale genetic sequence stratigraphic analysis. Some oil-wells from Majnoon and West-Qurna oil fields were selected as a representative case for the regional sequence stratigraphic analysis. The south Iraqi Albian – Cenomanian – Turronian succession of 2nd-order depositional super-sequence has been analyzed based on the Arabian Plate chronosequence stratigraphic context, properly distinguished by three main chrono-markers (The maximum flooding surface, MFS-K100 of the upper shale member of Nahr Umr Formation, MFS-K140 of the upper Mishrif carbonate
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.