The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (radius center-end (RCE)) represent the second key. While the diagonal-radius center and the retina vessel's end (diagonal-radius center-end (DRCE)) represent the third key. The results illustrate the process's validity and applicability. Also, improve the time required to decrypt the cipher-text by a brute force attack (BFA) from (4.358e+139) year in the compared technique to (1.3074e+140) year for retina3. The BFA time will increase with increasing the number of retina vessels, as in retina1, 2, and 3, which have 24, 53, and 103 retina vessels.
Objectives: To evaluate the effect of non-pharmacological pain relief methods on duration of labor stage.Methodology: A quasi-experimental study design was conducted during the period of (4th July 2018 through 24th October 2018) on non-probability of (60) women (30) of them were a control group and (30) were the study group whom admitted to Al-Elwyia Maternity Teaching Hospital suffering from labor pain. A questionnaire was used as a tool of data collection Descriptive& Inferential statistical analyses were used to analyze the data.Result: The highest percentages of study and control groups were in age group (< 20) years old, primary schools graduates, housewife, from "urban area", within low category of socioeconomic scale,
... Show MoreIn the past infectious diseases affected the quality of lifestyle during home confinement. The study conducted examines the influence of home confinement during the COVID-19 pandemic outbreak on lifestyle, mental wellbeing, nutritional status, and sleeping pattern.
An online multicategorical questionnaire was distributed to collect demographic information combined with the following tools: Food Frequency Questionnaire (FFQ), International Physical Activity Questionnaire (IPAQ), WHO-5 wellbeing score, and Pittsburgh Sleep Quality Index (PSQI). A snowball non-discriminate sampling procedure was
In this study, poly4-(nicotinamido)-4-oxo-2-butenoic acid (PNOE) was prepared by the electro polymerization of 4-(nicotinamido)-4-oxo-2-butenoic acid (NOE) monomer on a 316 stainless steel (St.St) which acts as an anticorrosion coating. Fourier transforms infrared (FTIR), atomic force microscopy (AFM), scanning electron microscopy (SEM), and cyclic voltammetry were used to diagnose the structure and the properties of the prepared polymer layer. The corrosion behavior of the uncoated and coated 316 St.St were evaluated by using an electro chemical polarization technique in 0.2 M hydrochloric acid solution as a corrosive medium at a temperature range of 293 to 323 K. Nano materials, such as nano ZnO and graphene were added in di
... Show MoreIn this work, a joint quadrature for numerical solution of the double integral is presented. This method is based on combining two rules of the same precision level to form a higher level of precision. Numerical results of the present method with a lower level of precision are presented and compared with those performed by the existing high-precision Gauss-Legendre five-point rule in two variables, which has the same functional evaluation. The efficiency of the proposed method is justified with numerical examples. From an application point of view, the determination of the center of gravity is a special consideration for the present scheme. Convergence analysis is demonstrated to validate the current method.
Awsaj (Lycium barbarum) is a plant belong to family Solanaceae serves as a good source of bioactive compounds like phytosterols which have many important biological activity. Literature survey available so far revealed that there was no studies about Iraqi wild Awsaj phytosterols especially B-sitosterol, there for the objective of this study was to examine the efficiency of ultrasound assisted extraction (probe and bath) as compared to the conventional (Soxhlet) extraction method for extraction of phytosterols especially B-sitosterol from fruits, leaves, stems and roots of Iraqi wild Awsaj plant. This goal was achieved by comparing the extraction mass yield, also by a quick and easy approach for identification and quantification of bioac
... Show MoreSimple and sensitive batch and Flow-injection spectrophotometric methods for the determination of Procaine HCl in pure form and in injections were proposed. These methods were based on a diazotization reaction of procaine HCl with sodium nitrite and hydrochloric acid to form diazonium salt, which is coupled with chromatropic acid in alkaline medium to form an intense pink water-soluble dye that is stable and has a maximum absorption at 508 nm. A graphs of absorbance versus concentration show that Beer’s law is obeyed over the concentration range of 1-40 and 5-400 µg.ml-1 of Procaine HCl, with detection limits of 0.874 and 3.75 µg.ml-1 of Procaine HCl for batch and FIA methods respectively. The FIA average sample throughput was 70 h-1. A
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More