Retreatment Efficacy of Continuous Rotation Versus Reciprocation Kinematic Movements in Removing Gutta-Percha with Calcium Silicate-Based Sealer: SEM Study, Raghad Noori Nawaf*, Ra
Recent accumulated evidences suggest that prolactin is an important immunomodulator and may have a role in the pathogenesis of systemic lupus erythematosus (SLE). The aim of this study was to assess the frequency of hyperprolactinemia in women with SLE and to evaluate its correlation with disease flares. Serum prolactin levels were measured in 62 women with SLE and 50 age- and sex-matched healthy controls. In patients and control groups prolactin levels were determined by immunoradiometric assay (IRMA). The prolactin level was found to be higher than normal rang in (40.3%) of SLE patients in active stage versus only (8.06%) of the same SLE patients but in the inactive stage and in (4%) of control group, the elevation was ranging between mi
... Show MoreThe use of containers in transportation leads to the reduction in time and effort of the process of loading and unloading of goods as well as protecting the goods from damage and breakage and to reduce the financial costs.
. This development has led also to make changes in the sizes and capacity of ships, therefore changes in the ports must be taken place where they must be provided with an appropriate depth for such vessels, that means the increase in the depth of ports and the establishment of wide storage yards and to provide appropriate mechanisms for handling process.
In this study, the researcher has dealt with this type of transport business in Iraqi ports, namely:
1- Khur Al-Zubair port.
2- Um Qaser port.
In order
Tuberculosis is caused by Mycobacterium tuberculosis; it is considered as one of the most common, infectious diseases and major causes of morbidity and mortality worldwide. A prospective study was conducted to obtain more clarification about the impact of causative agent and its treatment to enhance autoantibodies production such as ANCA and BPI which used as diagnostic markers for several diseases, and to provide further insight into the classical risk factors (age and sex).Seventy patients with tuberculosis involved in this study, 35 of them were untreated and 35 with treatment administration these patients were attending to directorate of general health national reference laboratory in Baghdad during the period between November/ 2012 and
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023