Background: The oral cavity is considered as a complex ecological niche, its complex microbial community is reflected to it. Streptococcus mutans has been implicated as one of the major etiological factor of dental caries. Tooth surfaces colonized with Streptococcus mutans are at a higher risk for developing caries, while lactobacilli are considered as the secondary invaders, not initiators of the carious lesion. The main purpose of this study was to correlate the dental caries (for primary and permanent teeth) in the upper jaw with the streptococcus mutans and lactobacilli count in the dental plaque and saliva, also to correlate the dental caries (for primary and permanent teeth) in the lower jaw with the streptococcus mutans and lactobaci
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreIn this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.
Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle
... Show MoreEichhornia crassipes (Mart.) Solms or Water hyacinth is a fertile floating aquatic widespread in worldwide. The form of plants and the anatomy parts of this plant were studied. The most important feature was obvious the air chamber with intercellular spaces by amazing arrangement. As well can notice aerenchyma tissue allow the parts of plants floated on the surface of water located in the ground meristem of root, petiole and in the mesophyll of leaves also presence of two type of crystals raphides and styloid crystals was noted of various member in the plant in addition appear astrosclereids around the air chambers, to support the plant parts from the unsuitable environmental conditions such as the speed of water flow or floods or high leve
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Corruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More