<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.</p>
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreRemovable dental prostheses remain a reliable treatment for edentulous patients. Conventional fabrication requires multiple steps, whereas computer-aided design and manufacturing (CAD-CAM), particularly 3D printing, offers faster and more cost-effective alternatives. This in vitro study aimed to evaluate the effect of sandblasting on surface roughness and shear bond strength of silicone soft liner bonded to 3D-printed and heat-cured acrylic denture base materials. Eighty specimens were divided into four groups: heat-cured control, 3D-printed control, heat-cured sandblasted, and 3D-printed sandblasted. Surface roughness was measured using a profilometer, while shear bond strength was tested with a universal testing machine. D
... Show MoreThis study included a survey and review of the scientific names of the marsh insects (aquatic and surrounding it) for the purpose of unifying and updating the database. The survey reveals 109 species under 77 genera that belong to 32 families and 7 orders as follow: Coleoptera (44 species), Diptera (7 species) Ephemeroptera (2 species), Hemiptera (14 species), Hymenoptera (11 species), Lepidoptera (2 species) and Odonata with 29 species. Information of specimens' collection for each species, synonyms and geographical distribution were provided.
This study included a survey and review of the scientific names of the marsh insects (aquatic and surrounding it) for the purpose of unifying and updating the database.
The survey reveals 109 species under 77 genera that belong to 32 families and 7 orders as follow: Coleoptera (44 species), Diptera (7 species) Ephemeroptera (2 species), Hemiptera (14 species), Hymenoptera (11 species), Lepidoptera (2 species) and Odonata with 29 species.
Information of specimens' collection for each species, synonyms and geographical distribution were provided.
Fundamentals Concept in Metorology an Introductory Survey - ISBNiraq.org
The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol
... Show More
