Background: The adenomatoid odontogenic tumor is a relatively rare benign epithelial odontogenic tumor. It contains both epithelial and mesenchymal components. Few cases presented as an extrafollicular lesion or involve the mandible or associated with other odontogenic lesions. This paper represents a rare case of an extrafollicular AOT. Case presentation: A 24-year-old female had a painless swelling on the right side of the lower jaw since one-month duration. Intraorally there was a well defined fluctuant-blue swelling in the right alveolar premolar region measuring 1×2 cm obliterating the right lower buccal vestibule. Grade II mobility in the vital 44 and 45 teeth were observed. Panoramic radiographs showed a well-defined pear shaped radiolucent lesion without calcifications between the roots of 44 and 45 that cause roots divergence. The lesion totally enucleated with the tooth 44 which showed root resorption. Microscopically, a cystic lesion lined by simple odontogenic epithelial cells with areas of polygonal nodular proliferation (sheets, whorled masses with few duct-like structures and clear cells) and amorphous eosinophilic material. This material was PAS –negative, and Congo red positive. The case diagnosed as a cystic extrafollicular variant of AOT with CEOT-like areas. Conclusions This case report describes the first known case of extrafollicular combined AOT/CEOT associated with root resorption and clear cells. The existence of clear cells suggest a possible aggressive nature and long follow up recommended.
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)
... Show MoreEcolinguistics is a twofold field in which ecology and language are its two major concerns. That is, this field is concerned with the way through which our thoughts, ideologies and the like influence the environment. The present study aims at analyzing (6) constructive and destructive environmental advertisements to find out how the techniques of erasure and salience operate in these types of advertisements. It studies the linguistic expressions that achieve these techniques in the constructive and destructive advertisements. The qualitative and quantitative methods are exploited in the current study. Analyzing (6) constructive and destructive environmental advertisements in accordance with Stibbe’s (2015) model of salience and erasure
... Show MoreRemote surveying of unknown bound geometries, such as the mapping of underground water supplies and tunnels, remains a challenging task. The obstacles and absorption in media make the long-distance telecommunication and localization process inefficient due to mobile sensors’ power limitations. This work develops a new short-range sequential localization approach to reduce the required amount of signal transmission power. The developed algorithm is based on a sequential localization process that can utilize a multitude of randomly distributed wireless sensors while only employing several anchors in the process. Time delay elliptic and frequency range techniques are employed in developing the proposed algebraic closed-form solution.
... Show MoreExperiments were carried out to investigate natural convection heat transfer in an inclined uniformly heated circular cylinder . The effects of surface heat flux and angle of inclination on the temperature and local Nusselt number variations along the cylinder surface are discussed . The investigation covers heat flux range from 92 W/m² to 487 W/m², and angles of inclination 0° ( horizontal) , 30° , 60° and 90° (vertical) . Results show an increase in the natural convection as heat flux increases and as angle of inclination moves from vertical to horizontal position. An empirical equation of average Nusselt number as a function of Rayliegh number was deduced for each angle of inclination .
Survivin, a member of inhibitor of apoptosis family is increasingly used as a target for cancer therapy design because it has a key role in cell growth and inhibition of cell apoptosis. Also it can be used as a biomarker for targeting cancer because it is found in almost all cancer but not normal cells. Our strategy was to design (computationally) a molecule to be used as survivin inhibitor. This molecule was named lead10 and was used furthermore to find (virtually) existing drugs with a good survivin inhibition activity.
The current research attempts to find a feed additive that enhances fish growth and eliminate toxins generated from fungi and mold, which are found in improperly manufactured and stored feed, while ensuring the safety of these fish meat for the consumer. Therefore, the organic properties of chitosan powder were examined in order to determine its impact on maturation of young