Secure Matchmaking and Authentication Protocol
Secure Matchmaking and Authentication Protocol
126
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Editorial Team
Tikrit University\ College of
Prof. Dr. Ghassan Ezzulddin Education for Pure Editor-in-Chief of the
Arif Science's\ Department of Journal
Iraq
Mathematics.
University of Samarra\
Assist. Prof. Baraa Managing Editor of the
College of Education\
Mohammed Ibrahim Al-Hilali Journal
Biology Department Iraq
University of Mashreq/
Asst. inst. Alyaa Hussein College of Medical Sciences Editorial Secretary of the
Ashour Technologies Department of Iraq Journal
Medical Physics
Assist. Prof. Dr. Hadeer Akram Dept. of Public Health Sciences USA
Al-Ani UC Davis School of Medicine
Assist. Prof. Dr. Jawdat Akeel College of Science Al-Zulfi KSA
Mohammad Alebraheem Majmaah University, Al-Majmaah
Assist. Prof. Dr. Almbrok Sebha University Libya
Hussin Alsonosi OMAR
Assist. Prof. Dr. Saad Sabbar University of Technology and Applied Sultanate oman
Dahham Sciences
1
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Biology Chemistry
Physics Geology
Computer Agriculture
Engineering Mathematics
Medicine Pharmacy
Environment Nursing
2
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Managing Director:
Phone: +962799424774
3
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Index
No. Research Title Researcher Page No.
1. Effect of a rotating Frame on Peristalsis Flow of a Hana I. Lafta1, 5-17
Walter's B fluid model suspension in a Porous medium, Zainab A. Jaafar2 and
Physical Survey Rana G. Ibraheem3
2. Evaluation of Tumor necrosis factor-TNF α and some Fidan Fikrat Ahmed1, 18-26
Arjan Aydin Zeynel2
vitamin levels and ferritin in women with Breast Cancer
in Kirkuk City
3. Study of the effect of Fucus Vesiculosus algae and Sara H. Oubid 1 27-41
relationship to thyroid hormones in rabbit serum dosed Huda F. Ramadan 2
with Thiourea. Sara O. Rasheed3
4. The effect of Allium sativum extract and antibiotics Luma Safi Abd 42-47
against Shewanella putterfaciens bacteria isolated from
Urinary Tract Infection
6. Hiding Secret Data in Color Video Applying Hatem Nahi Mohaisen1, 69-81
Modify RSA for Cryptography with Randomly Mohammed Q. Mohammed2,
Select Frame and Pixel to Steganography Mustafa Hatem Nahi3
4
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
1
Department of Mathematic, Diyala Education Directorate, Diyala, Iraq.
2
Department of Physics, College of Education / Tuz Khurmatu, Tikrit University, Tikrit, Iraq
3
Ministry of Science and Technology, Baghdad, Iraq
5
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
ABSTRACT
An effect of arotating frame on peristalsis flow of Waster's B fluid model suspension in apouros
metium, physical survey in an asymmetric channel is analyzed. In the asymmetric channel, initially we
took into account the condition of non-slip on the channel walls and treated the equations of countinuty,
momentum, energy and concentration by using the wave frame work with assumptions of long
wavelength and low Reynolds number for the purpose of simplification. The regular turbulence method
was used to analyze and study the salient features of the flow properties by solving the constitutive
equations for each. From the axial velocity, pressure gradient and temperature distribution, In addition
to the concentration equation, and then discuss with explain the behavior of the parameters graphically
using the mathematical program "MATHEMATICA" saft ware and obtain practically accurate results.
Key words: Rotating frame, Walker's B fluid, Porous mediam, peristalsis flow, pertubation technique.
1. INTRODUCTION
Peristalsis flow is the vital mechanism used to distinguish a progressive wave of region expansion or
reduction which spreads above the Length of the walls of channel. Peristaltic stream is an ingrained
characteristic of numerous tubiform body part of the human. It is further employed for many industrial
enforcement just as corrosive as well as noxious fluids transmit, the blood pumps in heart lung gadget
and transport the sanitary fluid. The studies on peristaltsis the flow is widely expanded and developed
and several studies, researches on the peristalsis transport [1]–[4]. Rotation effect on peristaltis flow of
Walter's B fluid in the porosity space on an asymmetric channel with No-slip condition [5]–[7]. Effect
of couple stress with slip condition and rotation on peristaltic flow of a Powell- Eyring fluid with the
influence of an inclined asymmetric channel with porous medium ,has been investigated by R. G.
Ibraheem and L. Z. Hummady [8]. Abd-Alla and Abo- Dahab [9]studied the rotation effect on
peristaltic transport of a Jeffrey fluid in an asymmetric channel with gravity Field. Z. A. Jaafar et al.
[10], discussed the impact of couple stress with rotation on Walters , B fluid in porous medium. Abd-
Alla et al. [11] investigated Radially Varying magnetic field on the peristaltic flow in a tube with an
endoscope under the effect of rotation. Mahmoud et al. [12] investigated the effect of the rotation on
wave motion through cylindrical bore in amicropolar porous medium.Abd-Alla et al. [13] discussed the
effect of retortion and magnetic field on non-linear peristaltic flow of second-order fluid in an
asymmetric channel through a porous medium. Abd-Alla etal. [14] analyzed the effects of an
endoscope and rotation on peristaltic flow in atube with long wavelength Saba and Ahmed [15]
discussed influence of rotating frame on the peristaltic flow of a Rabinowitsh fluid model in an inclined
channel. Many studies deal with the outcome of vatation because of it is significance in fluid mechanics
as decorated in industrial fields as well as mechanical engineering besides physicalgical operations, for
examples food treatment biochemical operations, biomedical engineering, transfer in polymers,
6
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
3. CONCLUSIONS
It was found in this paper some applications of the notion of differential subordination as it relates to
subclasses of univalent functions that use specific convolution as operators. We did examine geometric
properties of these kinds of functions, including coefficient bounds, distortion theorem, starlikeness and
convexity radii, among others. Extreme points and the integral operator have both been studied.
We investigated a few of the characteristics of variations subordination of analytical univalent functions
over an open unit disc as well as deduced specific subordination as well as superordination properties
using the characteristics of the broader a byproduct operator. Additionally, it gave insight into
geometrical traits like coefficient disparities and Hadamard product characteristics. There were
installed certain intriguing findings for derivatives differential subordination as well as superordination
of analytical univalent functions. Then, a few findings of variations subordination that involve linear
operators have been presented employing the convolution with two linear operators. The convolution
operator has been used to deal with a number of leads to over differential subordination within the unit
disk with open edges employing broader hypergeometric function.
Through the use of an operator with linearity as well as variations subordination, we arrived at a few
conclusions as well as a few sandwich theorems. As an a few convolution as a operators, we as a
species provided a few variations subordination programs towards subclasses about univalent functions.
Through the application of a straight-line operator, it was possible to achieve certain important
outcomes in the variations subordination as well as variations superordination about meromorphic
analyzing univalent functions of the second order. Lastly, we provided a few outcomes over 2nd-order
differential subordination within the open section disk involving broader hypergeometric function
employing the convexity operator.
2. Mathematical Formulation
This paper test an incompressible Walter’s B fluid model in a peristalsis transport with effect of
arotating frame suspension in a porous media, physical survey. The non-Newtonian. (Walter's B fluid)
fills in two dimensional and a symmetric channel of width " . This flow induced by a sinusoidal
wave train of ( ) wavelength, ( ) Constant wave speed, and are amplitudes of the waves, is
the time wave.
7
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
The physical sketch of this problem (Fig-1) represented the geometrical equations of the walls can be
expressed as:
(1)
3. Constitutive Equation
The constitutive equations of two-dimensional for Walter's B fluid flow in a aboratory frame
write as follows:
(2)
(3)
(4)
(5)
(6)
8
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
The velocity components in directions with an associated conditions of the boundary are
no slip at the channel walls as:
(7)
In rotating frame we have two terms the centrifugal force and ( ) the coriolis force with
the constituent equation of Warter's B flavid model is expressed as [21] :
(8)
And (9)
Where , the small shear rate and the short memory coefficient.
is the distribution function with relaxation time and 2 , are neglected in case of
Walter's B fluid model.
(10)
Now assume the motion peristalsis steady by using the labortory frame which is given as:
(11)
9
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
(12)
In light of eqs.(11)-(12), and their substitution in the eqs.(2-6), we conclude the following:
(13)
(14)
(15)
(16)
(17)
(18)
(19)
Where
(20)
(21)
(22)
when we use the laboratory frame Q = the mean flow rate is related to F by:
10
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
(23)
Also
(24)
(25)
4. Exact solution
From eq. (19), which is non-linear with difficultness, then we solve it by perturbation method and
expand as:
(26)
Where (27)
(28)
Where (29)
(30)
Where (31)
(32)
(33)
(34)
11
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
where (35)
(36)
(37)
(38)
(39)
(40)
12
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
parameters, the entir pumping area consists of three main areas. The First is called the retrograde
pumping and the second is the co-pumping , and the third area is
called augmented pumping .
Figures (2,4,5 ) highlight the variation of the pressure rise for different values of the parameters
( , , ) as the pressure rise increases with increasing ( , , ) in the retrograde pumping and co-
pumping area on the contrary in the augmented pumping area. Figures ( 3 and 6) are plotted to see the
impact of and on the pressure rise, it's observed that decreases in retrograde pum ping area and co-
Pumping area with an increase in augmented pumping area. The opposite thing happens with
increasing as shown in figure (7).The graphical nouits for concentration profile are illustrated in
figures (8-20) figure (18 ) explain that the effect of parameters on the concentration profile it is
observed that the concentration distribution exhibits oscillating behavior with an increase in the ( ,
from figure (12) the concentration distribution decreases in the central area and right channel wall, but
incenses near the left channel wall for increasing in ( ) while the opposite behavior is occurring with
the increase in (a), as shown in figure (13), figures (8,9,10,11) deduced that the concentration decreases
by increasing in( .
Figures (14,15,16) and (17) shown that the concanbehan distribution decreases near the channel walls
and then gradually disapear as there is no effect on the concentration distribution to the rest of the
channel with an increase in ( ) and .
13
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
.2. Concentration:
14
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
15
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
8. Conclusions
The influence of arotating frame on peristalsis flow of Walter's B fluid model suspension in a
porous medium in asymmetric channel is investigated under low Reynolds number and long
wavelength. The flow is considered in two-dimensional, non-linear partial differential equation was
solved by using perturbation technque, some of interesting conclusions are Summarized as follows:
The impact of various parameters on the pressure rise are different for different pumping area.
Opposite behavior for pressure rise profile is noticed compared to concentration distribution.
Prosure rise is decreasing function of the parameters (K and ) and the opposite thing happens
with parameter ( ).
Concentration distribution increases in the presence of ( ) near the left channel wall while the
opposite behavior is occurring with increase of (a).
Concentration distribution decreases in the presence ( ) and near the channel walls and
then gradually disapper as there is no effect on the concentration distribution to the rest of the
channel with an increse in this parameter.
9. Reference
[1] A. K. Hage and L. Z. Hummady, “Influence of inclined magnetic field and heat transfer on peristaltic transfer
Powell-Eyring fluid in asymmetric channel and porous medium,” Int. J. Nonlinear Anal. Appl., vol. 13, no. 2, pp.
631–642, 2022.
[2] A. M. Abdulhadi and A. H. Al-Hadad, “Effects of rotation and MHD on the Nonlinear Peristaltic Flow of a Jeffery
Fluid in an Asymmetric Channel through a Porous Medium,” Iraqi J. Sci., vol. 57, no. 1A, pp. 223–240, 2016.
[3] S. A. Abdulla and L. Z. Hummadya, “Inclined magnetic field and heat transfer of asymmetric and Porous Medium
Channel on hyperbolic tangent peristaltic flow,” Int. J. Nonlinear Anal. Appl., vol. 12, no. 2, pp. 2359–2371, 2021.
16
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
[4] F. A. Adnan and A. M. A. Hadi, “Effect of an inclined magnetic field on peristaltic flow of Bingham plastic fluid in
an inclined symmetric channel with slip conditions,” Iraqi J. Sci., pp. 1551–1574, 2019.
[5] A. M. Abdulhadi and T. S. Ahmed, “Effect of magnetic field on peristaltic flow of Walters’ B fluid through a porous
medium in a tapered asymmetric channel,” J. Adv. Math., vol. 1, no. 12, pp. 6889–6893, 2017.
[6] T. S. Alshareef, “Impress of rotation and an inclined MHD on waveform motion of the non-Newtonian fluid through
porous canal,” in Journal of Physics: Conference Series, 2020, vol. 1591, no. 1, p. 12061.
[7] M. I. Khan, S. U. Khan, M. Jameel, Y.-M. Chu, I. Tlili, and S. Kadry, “Significance of temperature-dependent
viscosity and thermal conductivity of Walter’s B nanoliquid when sinusodal wall and motile microorganisms
density are significant,” Surfaces and Interfaces, vol. 22, p. 100849, 2021.
[8] R. G. Ibraheem and L. Z. Hummady, “Effect of Couple-stress with Slip Condtion and Rotation on Peristaltic Flow
of a Powell-Eyring Fluid with the Influence of an Inclined Asymmetric Channel with Porous Medium,” J. Basic
Sci., vol. 10, no. 17, 2023.
[9] A. M. Abd-Alla and S. M. Abo-Dahab, “Rotation effect on peristaltic transport of a Jeffrey fluid in an asymmetric
channel with gravity field,” Alexandria Eng. J., vol. 55, no. 2, pp. 1725–1735, 2016.
[10] Z. A. Jaafar, M. H. Thawi, and L. Z. Hummady, “Impact of Couple Stress with Rotation on Walters , B Fluid in
Porous Medium,” pp. 189–201, 2023.
[11] A. M. Abd-Alla, S. M. Abo-Dahab, and M. M. Albalawi, “Radially varying magnetic field on the peristaltic flow in
a tube with an endoscope under the effect of rotation,” J. Comput. Theor. Nanosci., vol. 12, no. 10, pp. 3066–3075,
2015.
[12] S. R. Mahmoud, A. M. Abd-Alla, and M. A. El-Sheikh, “Effect of the rotation on wave motion through cylindrical
bore in a micropolar porous medium,” Int. J. Mod. Phys. B, vol. 25, no. 20, pp. 2713–2728, 2011.
[13] A. M. Abd-Alla, S. M. Abo-Dahab, and H. D. El-Shahrany, “Effects of rotation and magnetic field on the nonlinear
peristaltic flow of a second-order fluid in an asymmetric channel through a porous medium,” Chinese Phys. B, vol.
22, no. 7, p. 74702, 2013.
[14] A. M. Abd-Alla, S. M. Abo-Dahab, and H. D. El-Shahrany, “Effects of an endoscope and rotation on peristaltic flow
in a tube with long wavelength,” J. Comput. Theor. Nanosci., vol. 11, no. 4, pp. 1055–1068, 2014.
[15] S. S. Hasen and A. M. Abdulhadi, “Influence of a rotating frame on the peristaltic flow of a rabinowitsch fluid
model in an inclined channel,” J. Al-Qadisiyah Comput. Sci. Math., vol. 12, no. 1, p. Page-21, 2020.
[16] T. Hayat, M. Rafiq, and B. Ahmad, “Soret and Dufour effects on MHD peristaltic flow of Jeffrey fluid in a rotating
system with porous medium,” PLoS One, vol. 11, no. 1, p. e0145525, 2016.
[17] A. Ahmad Dar and K. Elangovan, “Influence of an inclined magnetic field and rotation on the peristaltic flow of a
micropolar fluid in an inclined channel,” New J. Sci., vol. 2016, 2016.
[18] Z. Benharkat and M. N. Bouaziz, “MHD Rotating Fluid Past a Semi-Infinite Vertical Moving Plate: Coriolis Force
and Wall Velocity Effects,” J. Adv. Res. Fluid Mech. Therm. Sci., vol. 60, no. 1, pp. 38–51, 2019.
[19] A. A. Khan, H. Usman, K. Vafai, and R. Ellahi, “Study of peristaltic flow of magnetohydrodynamics Walter’s B
fluid with slip and heat transfer,” Sci. Iran., vol. 23, no. 6, pp. 2650–2662, 2016.
[20] Z. A. Jaafar, L. Z. Hummady, and M. H. Thawi, “Effects of Rotation and Inclined Magnetic Field on Walters’ B
Fluid in a Porous Medium using perturbation method or technique.,” Iraqi J. Sci., 2024.
[21] S. BARIŞ, “Steady flow of a Walter’s B’viscoelastic fluid between a porous elliptic plate and the ground,” Turkish
J. Eng. Environ. Sci., vol. 26, no. 5, pp. 403–418, 2002.
17
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
[email protected]
[email protected]
18
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Email: [email protected]
Email: [email protected]
Abstract
This study aimed to evaluate the role of Vitamin D3 deficiency in women with breast cancer. This
study was conducted to estimate tumor necrosis factor (TNF)- α and vitamins (D3, B12, folate), and
ferritin levels this study estimate. Some hematological parameters such as hemoglobin (Hb), white
blood cells (WBC), platelet level, erythrocyte sedimentation rate (ESR) in women with breast cancer
patients. The study started from november 2022 to march 2023, The study population included 50
females, with them 15 in the healthy control (control group) and 35 patients with breast cancer (patient
group), whose ages ranged from 25 to 96 years also the mean age is 53 years.
The current study showed a significant low (P< 0.05) in the mean vitamin D3 level (25.97±13.5
ng/ml), vitamin B12 (288.63 ± 78 pg/ml), folate (9.44 ± 4.6 ng/ml), hemoglobin level (11±1.52 g/L),
and percentage of packed cell volume (31±10.6) in the patient group with the control group. Also, the
current study shows elevated ( P< 0.05 ) in the TNF α and the mean of white blood cells ( 20 ×109 ±
24.5 cell/mm3 ) and Platelet level ( 269 ± 143.8 billion/L ) and ESR ( 203 ± 11.3 mm/hr ) and ferritin
level ( 157.4 ± 113.4 ng/ml ) in the patient group among to the control group.
Key words: - Breast cancer, Tumor necrosis factor, Vitamins, Ferritin .
Introduction:
(1,2, 3)
Breast cancer is one of the most common malignant types of tumors . It's incidence is higher in
women than men (4,5). It is a disease that has a genetic background but environmental factors donate to
(6,7,8).
it' occurrence and shows a large degree of heterogeneity between and within tumors Tumor
necrosis factor (TNF)-α is one of the cytokines that are secreted from macrophages and natural killer
(9)
cells. This cytokine promotes inflammation. It is contribute to development of cancer . TNF is used
(10)
as a tumor marker to determine the stage of breast cancer , and that its mechanism of action is
(11).
through receptors on the cell surface to regulate the programmed cell death pathway Vit.D3 is a
known has potential anticarcinogenic impacts, including regulation of cell growth and proliferation,
stimulation of apoptosis, and down-regulation of estrogen receptors(12 , 13). Ferritin is protein mainly
19
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
synthesized in the liver (14). Recently, there is an evidence that ferritin has a role of in the pathogenesis
of a number of diseases, including breast cancer (15).
The level of CBC was evaluated according to a kit manufactured by the company Starlab.
The level of tumor necrosis factor was estimated according to a kit prepared by the company Starlab.
-Estimation of Vit. D3, B12 and folic acid level in the blood serum:
The level of vitamins (D3, B12, and folic acid) was estimated according to a kit organized by the
company Nepegon health crop.
The level of ferritin was evaluated according to a kit prepared by the company Nepegon health crop.
Statistical analysis:
The result analyzed using the statistical package for the social science (SPSS) program. Descriptive
statistics like mean, frequency, and percentage were conducted. Other inferential statistical test like
unpaired T-test was employed for assessing relation between TNF-α levels and breast cancer. The
differences were taken as statistically significant when P< 0.05.
20
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Table 1 shows the mean ± standard deviation (SD) of hematological parameters in control group and
patient group.
Figures (1, 2, 3, 4 and 5) demonstrated a significant reduce in the level of Hb, PCV in the patinas
compered control group. Also the results showed the increase in the mean of platelet and ESR for the
patient compared to the control group.
Figure 2: The level of PCV in blood group. Figure 1: The level of Hb in blood group.
21
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Figure 4:The level of PTL in blood group. Figure 3: The level of ESR in blood group.
22
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Estimation of tumor necrosis factor and Vitamin D3, Vitamin B12, Folate, and Ferritin level:
Table 2 shows the mean ± SD of biochemical parameters in control group and patient group.
Mean ± SD Mean ± SD
The result showed a significantly increase in TNF-α and ferritin levels in breast cancer patients
compared to controls as in figure (6,7) , also the results showed a significantly decline in all vitamins (
D3, B12 and folic acid) in breast cancer patients compared to controls as in figure (8,9, 10) .
23
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Figure 8: Vit.B12 level in blood serum Figure 7: Vit.D3 level in blood serum.
Figure10: Ferritin level in blood serum. Fig 9: Folic acid level in blood serum.
The result displayed that the bleeding occurring and related to the tumor’s invasion of the bone
marrow may be lead to low level of Hb rate and the PCV percentage, the consequence is the bone
marrow failure (16). Alternatively, white blood cells have been found to be associated to breast cancer
(17)
. Cancer cells causes thrombocytosis and platelet aggregation that are the reasons for high platelets
(16)
. On the other hand, it was found that the cancer has relationship with increased level of erythrocyte
sedimentation ratte (18).
TNF-blockers act as therapeutic agents in solid tumors, but patients with elevated in TNF-α fail to
respond to infliximab, due to consumption of circulating TNF-blockers and tumor progression (19). TNF
activates nuclear factor Kappa (NFK) B (19). TNF when exposed to cancer cells (20), as NKB-TNF plays
(21)
an important role in inflammation, immune regulation, cell differentiation, and tumor formation ,
and contributes to cancer cell proliferation, tumor angiogenesis in cancer cells, stimulation of cell
proliferation and prevention of apoptosis (22). One of the TNF receptors TNF-α that is located inside the
mitochondria and has relationship with apoptosis(23,24). Vitamin D deficiency is highly valuable
24
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
(25)
consequence of breast cancer in women . The low level of serum folate and vitamin B12 is
considered indicator for improved breast cancer risk (26),
References:
1- Ebrahim, S. Knowledge of students toward breast cancer and breast self-examination practice at high school nursing in
Basra city. Rev J Kufa for Nurs Sci 4.1 (2014): 0-0.
2- Yedjou, Clement G., et al. "Health and racial disparity in breast cancer." Breast cancer metastasis and drug resistance 2019.
31-49.
3- Sariego, Jack. "Breast cancer in the young patient." The American surgeon 76.12 (2010): 1397-1400.
4- Jemal, Ahmedin, et al. "Cancer statistics, 2010." CA: a cancer journal for clinicians 60.5 2010; 277-300.
5- Feng, Y., Spezia, M., Huang, S., Yuan, C., Zeng, Z., Zhang, L., Ji, X., Liu, W., Huang, B. and Luo, W. Breast cancer
development and progression: Risk factors, cancer stem cells, signaling pathways, genomics, and molecular pathogenesis.
Genes and diseases, 2018; 5 (2):77-106.
6- Yeo, S. K. and Guan, J.-L. Breast cancer: multiple subtypes within a tumor? Trends in cancer, 2017; 3 (11):753-760.
7- Testa, U., Castelli, G. and Pelosi, E. Breast cancer: a molecularly heterogenous disease needing subtype-specific treatments.
Medical Sciences, 2020; 25(1):115-121.
8- American Cancer Society. Breast cancer facts & figures (2019-2020). Am. Cancer Soc. 17:1-44.
9- Al-dulaimy NH, Hassan AJ, Al-Araji SM. Estimation of interferon-α (IFN-α) and tumor necrosis factor-α (TNF-α) in female
rats immunized by human breast cancer cell line T47D. Journal of University of Babylon. 2016;24(9).
10- Papadopoulou E, Tripsianis G, Anagnostopoulos K, Tentes I, Kakolyris S, Galazios G, Sivridis E, Simopoulos K, Kortsaris
A. Significance of serum tumor necrosis factor-alpha and its combination with HER-2 codon 655 polymorphism in the
diagnosis and prognosis of breast cancer. The International journal of biological markers. 2010;25(3):126-35. 100.
11- Zhang JM, An J. Cytokines, inflammation and pain. International anesthesiology clinics. 2007;45(2):27.
12- O’Brien KM., Sandler DP., Taylor JA., and C. R. Weinberg. “Serum Vitamin D and Risk of Breast Cancer within Five
Years”. Environmental Health Perspectives, vol.125, No. 7, 2017.
13- Xie S., Tan M., Li H., et al. “Study on the correlation between B vitamins and breast cancer”. Cancer Cell International,
vol.23, No. 1, pp 1-15, 2023.
14- Cullis JO., Fitzsimons EJ., Griffiths WJ., et al. “Investigation and management of a raised serum ferritin”. British journal of
haematology, vol.181, No. 3, pp.331-340, 2018.
15- Reuter S., Gupta SC., Chaturvedi MM., et al. “Oxidative stress, inflammation, and cancer: how are they linked?”. Free
radical biology and medicine, vol.49, No. 11, pp 1603-1616, 2010.
16- Aynalem M., Adem N., Wendesson F., et al. “Hematological abnormalities before and after initiation of cancer
treatment among breast cancer patients attending at the University of Gondar comprehensive specialized hospital cancer
treatment center”. Plos one, vol.17, No. 8, pp 1-10, 2022.
17- Erhabor O., Chinoye ME., Michael R., et al. “Some full blood count parameters among women of African descent with
breast cancer in Sokoto, North-Western Nigeria”. Journal of Pregnancy Reproduction, vol.2, No. 1, pp 1-6, 2018.
25
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
18- Eboreime O., Atoe K., and Idemudia J O. “Erythrocyte sedimentation rate and C-reactive protein levels in breast cancer
patients in Benin City Nigeria”. Cell, vol.21, No. 22, pp 116-119, 2015.
19-Yu M, Zhou X, Niu L, Lin G, Huang J, Zhou W, Gan H, Wang J, Jiang X, Yin B, Li Z. Targeting transmembrane TNF-α
suppresses breast cancer growth. Cancer research.2016: 1;73(13):4061-74.
20- Balkwill F. Tumour necrosis factor and cancer. Nature reviews cancer.2009;9(5):361-71.
21- Gilmore TD. Introduction to NF-κ B: players, pathways, perspectives. Oncogene. 2006;25(51):6680-4.
22- Xia Y, Shen S, Verma IM. NF-κB, an active player in human cancers. Cancer immunology research.2014. 1;2(9):823-30.
23- Lafont E, Draber P, Rieser E, Reichert M, Kupka S, de Miguel D, Draberova H, von Mässenhausen A, Bhamra A,
Henderson S, Wojdyla K. TBK1 and IKKε prevent TNF-induced cell death by RIPK1 phosphorylation. Nature cell
biology.2018;20(12):1389-99.
24- Perez D, White E. TNF-α signals apoptosis through a Bid-dependent conformational change in Bax that is inhibited by E1B
19K. Molecular cell.2000. 1;6(1):53-63.
25- Benarba B., & Gouri A. “Role of vitamin D in breast cancer prevention and therapy: Recent findings”. Journal of Medicine,
vol.21, No. 1, pp 46-50, 2020.
26- Lajous M., Lazcano-Ponce E., Hernandez-Avila M., et al. “Folate, vitamin B6, and vitamin B12 intake and the risk of breast
cancer among Mexican women”. Cancer Epidemiology Biomarkers & Prevention, vol.15, No. 3, pp 443-4484, 2006.
26
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
27
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
[email protected]
[email protected]
[email protected]
Abstract
A biochemical study was conducted to identify the effect of Fucus Vesiculosus algae , which is
directly related to hypothyroidism in the serum of adult white rabbits dosed with the drug thiourea, by
measuring the level of thyroid hormones, antioxidants, and oxidative stress in the blood serum of (28)
rabbits. The animals were divided. into four groups, in the following order:
• The positive control group was dosed orally with Distil water.
• The Negative control group: - dosed orally with Thiourea at a concentration of 5 mg/cm3.
• The first group G1 :- was dosed with 5 mg/kg/day of thiourea and then 100 mg/kg/day of crude
extract of Fucus Vesiculosus algae .
• As for group G2, they were dosed with 5 mg/kg/day of thiourea and then 150 mg/kg/day of the crude
extract of Fucus Vesiculosus algae . The results showed the following:
The results showed that the level of TSH showed a significant decrease in all groups compared to the
positive control group in the fourth week of dosing. Also the T3 hormone level showed a significant
increase in all groups C1, G1, and G2 compared to the positive control in the fourth week of dosing. In
addition, the T4 hormone showed a significant increase in all groups C2, G1, and G2 in the fourth week
of dosing. As well as the glutathione level, it showed a significant decrease in all groups compared to
the positive control group in the fourth week of dosing. Also the malondialdehyde showed a
significant increase in the serum of the groups compared to the positive control group in the fourth
week of dosing.
Introduction
Medicinal plants were and still are the basis through which the pharmaceutical and pharmaceutical
industry has developed. Plants have been exploited as a source of medicines throughout human history
28
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
and in all cultures. Scientific progress has allowed us to identify a small portion of the active
compounds and their mode of action, as medicinal plants continue to contribute effectively to human
health and progress, especially since many voices around the world are calling for a strong return to
nature in many fields related to Human health because plants were and still are a source of food and
medicine for humanity. Since ancient times, man has known many medicinal plants and herbs that
grow wild in his environment. He found that many of them are useful in food and a few work as
medicine. He also learned about their properties and determined their benefits by using them. They use
traditional medicine to treat and remove diseases (1,2).
Algae and its extracts have also been used in various applications in various fields such as the
pharmaceutical industry, environmental treatments, and biotechnology, in addition to their use as
powerful naturally occurring anti-cancer compounds that have been proposed to prevent carcinogenesis
and to treat many diseases, including diarrhea, lung diseases, and bladder disorders (3, 4). In addition to
the use of many herbs in regulating thyroid hormones, such as Fucus vesiculosus algae, which is rich in
iodine, as Hameed and her group indicated that the algae has A role in regulating the level of thyroid
hormones and improving its function (5). Brown algae, widespread on rocky sea coasts in temperate and
cold regions, has also been used to treat the thyroid gland because it contains high amounts of iodine (6).
Moss is a genus of brown algae and is characterized by its greenish-brown color as a result of it
containing a layer of fucoxaxanthin, and when it dries it turns black (7).
Fucus Vesiculosus algae is used to treat cancerous tumors, especially colon cancer, as a result of it
containing high amounts of fibers (8). It is considered an antioxidant due to its high ability to attack free
radicals (9). Also, algae contains large amounts of iodine that can change the levels of thyroid hormones
(10)
. The thyroid gland constitutes an important component of the endocrine system that regulates many
physiological functions ranging from oxygen use, growth and development to cellular metabolism (11).
Thyroid hormones are considered an essential element in the growth of the body and affect the
formation of many enzymatic proteins. These hormones control most of the metabolic processes in the
body and any imbalance in these hormones may have a serious clinical impact on the various organs of
the body (12).
Glutathione is a non-enzymatic antioxidant that contains vital compounds and defense systems against
the danger of free radicals (13). Glutathione is involved in many metabolic processes, and its deficiency
leads to cellular danger as a result of oxidative damage (14). It has multiple functions, most of which
are maintaining cellular redox balance, maintaining adequate levels of cystine and removing toxins
from foreign substances entering the body (15).
MDA is an indicator of increased oxidative stress and an indicator of oxidation as well as the
incidence of some diseases, as the level of MDA increases in cancer patients (16,17). Fats are one of the
most vulnerable biomolecules to oxidative stress, and MDA is the main product of fat oxidation. It is a
toxic molecule and must be taken into consideration as it is not only a sign of fat peroxidation, but it
can interact with proteins and DNA, leading to the occurrence of oxidative stress (18). 19), so the
current research aimed to study the effect of Fucus vesicularis algae and its relationship with thyroid
hormones in the serum of adult white rabbits dosed with the drug thiourea.
29
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
(28) adult local white rabbits were used in this study. Their weights ranged from (1-2) kg, and their
ages were (4-6) months. The study was conducted for the period from the beginning of April until May
of the year 2023, in the animal house at the university. The animals were placed in iron cages covered
with metal covers, with a floor covered with sawdust, and the hygiene aspect of the cages was taken
into account by replacing the sawdust two to three times a week and sterilizing the cages with
disinfectants, and the animals were fed daily and regularly with ready-made feed and water.
• Experiment design
The animals were randomly divided into four groups, with (7) rabbits for each group. The animals
were dosed orally with (5 mg/kg/day) of thiourea to induce hypothyroidism, and then they were dosed
with the crude extract of Fucus vesica, according to the following groups:
- Positive control group C1: was dosed orally with plain water.
- Negative control group C2: was dosed orally with thiourea at a concentration of 5 mg/kg/day.
- The first group, G1: was dosed orally with (5 mg/kg/day) of thiourea and then dosed with (100
mg/kg/day) of raw algae extract.
- The second group, G2: was dosed orally with (5 mg/kg/day) of thiourea and then dosed with (150
mg/kg/day) of raw algae extract.
After four weeks of dosing, the animals were starved for 12 hours and blood was drawn from them
using the heart puncture method. Then the dosing and blood drawing continued in the same way in the
fourth week of dosing, as (4) cm3 of blood was collected in the fourth week of dosing. The blood was
then emptied into clean, dry plastic tubes (One-time use) Free of anticoagulants. The blood was
separated using a centrifuge at a speed of 2500 rpm for 10 minutes. The blood serum was obtained and
stored at -20°C after dividing it into three parts in small Eppendrof tubes until the tests were performed.
Biochemistry of thyroid hormones, antioxidants, and oxidative stress.
It is allowed to concentrate both T3, TSH, and T4 by following the steps attached to the clarity kit
prepared by the American company Monobind, and specifying the manufacturer’s instructions for the
ELISA technology, as they are marked up to T3 according to the method (20). As for the T4 level, it is
determined according to method (21), while TSH is determined according to method (22).
The concentration of glutathione in serum was estimated using the modified method used by
researchers (Sedlak & Lindsay; Tietz) (23). The concentration of malondihyde in the serum was also
estimated using the modified method used by the researchers (Guidet & Shah ) (24).
30
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Statistical analysis
The Statistical analysis system - SAS 2012 was used, using Duncun's Multiple Range test to compare
between the groups. The Least Significant Differences - LSD was used in the test for the importance of
comparing means in this study. Special differences between the groups were also identified in The
fourth week of dosing using the T.Test (25).
Table (1) shows the mean ± standard deviation of thyroid hormones for the samples under study
Groups Mean ± SD
C1 C2 G1 G2
Parameter
n =28 n =28 n =28 n =28
Thyroid hormones
The protective effect of crude Fucus Vesiculosus algae extract against the effect of thiourea induced
hypothyroidism was studied by monitoring the level of thyroid hormones.
The results indicate that the level of thyroid-stimulating hormone showed a significant decrease at the
probability level (P≤0.05) in the control group compared to the other groups, as in Figure (1).
31
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Research did not indicate a therapeutic attempt for hypothyroidism using Fucus vesicular algae at the
hormone level, but Al-Samarrai (9) The effect of raw algae may cause a decrease in the level of thyroid-
stimulating hormone in the blood serum of adult white rabbits.
The low level of the hormone secreted by the pituitary gland in group G2 is due to the thyroid gland
not responding to the hormone, and thus its level in the blood rises. It may sometimes cause benign
hyperplasia of the thyroid gland, and at high concentrations it can cause cancer in rodents. Hyperplasia
of the pituitary gland occurs as a result of the hyperfunction required to secrete the hormone TSH (26).
.Also, the decrease in the hormone level in the fourth week of dosing may be due to the role of the raw
moss extract in reducing the effect of thiourea, restoring the thyroid gland to its function, and blocking
the harmful effect of thiourea. This is due to the properties of the moss as it contains antioxidant
compounds that have enhanced the role of the immune system in eliminating toxicity. Thiourea.
Level of T3 hormone
Table (1) shows that the T3 hormone level for the positive control group was (0.649±3.625) ng/ml,
while it was (0.437±2.721) ng/ml, and the treatment with thiourea for the negative control group. As for
groups G1 and G2, it reached (0.427±2.521). (0.283±2.012) ng/ml respectively and treated with crude
extract of Fucus Vesiculosus algae .
The results showed that the average level of the hormone decreased significantly in the negative control
group compared to the positive control group. The activity of the hormone also decreased at the
probability level (P≤0.05) in the blood sera of the two groups treated with the crude extract compared
to the negative control group. Here the effective and protective role of the crude extract against the
effect of thiourea and its regulation becomes clear. The work of the gland is as shown in Figure (2).
32
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
The reason for a decrease in the hormone level in the group treated with thiourea as a negative
control group may be due to the interference that occurs due to thiourea in the path of building
glandular hormones and its ability to convert iodine to the inorganic form (27). Also, the fucus moss
contains iodine, which may obscure the effect of thiourea as an additional source of iodine.
Or the reason for the decrease in the hormone may be explained by an inhibition in the activity of the
5-Monodeiodinase enzyme, which controls the conversion of the T4 hormone to T3 by thiourea, thus
causing a decrease in the hormone level and an increase in the level of the T4 hormone (28), if this result
is consistent with the level of the T4 hormone that was recorded. An increase in the fourth week of
dosing, and the reason for the decrease may also be due to the fact that the T3 hormone stimulated the
secretion of thyroid-stimulating hormone.
TSH from the pituitary gland through a feedback mechanism, and when this cause is removed, the
hormones will return to their normal levels (29).
The T3 hormone is 3-5 times more effective in peripheral blood than T4. It also has a low affinity
for plasma proteins, which makes it spread outside the vessels more easily than T4. Therefore, T3 is
more important at the cellular level than T4. Therefore, it is believed that T3 is the only effective
hormone and that T4 is the hormone’s generator, as it is transformed in the cell into T3 after the loss of
an iodine atom through the deiodenate process, and thus T3 can be considered the biologically active
hormone (30).
Level of T4 hormone
Table (1) shows that the hormone level for the positive control group was (1.352±0.222)
micrograms/cm3, while the negative control group showed (2.254±0.443) micrograms/ml and treated
with thiourea. As for groups G1 and G2, it reached (3.704±1.032). (2.649±0.500) respectively and
treated with the crude extract of Fucus vesicular algae.
33
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
The results showed that the average hormone level increased significantly and at the probability level
(P≤ 0.05) in the blood sera of all groups under study, C2, G1, and G3, compared to the positive control,
as in Figure (3).
Studies have not indicated a therapeutic attempt for hypothyroidism using Fucus vesicular algae at the
hormone level, but the results of Al-Samarra (9). It indicated that raw fucus moss shows an increase in
the hormone level in healthy groups treated with the moss.
The reason for the increase in the hormone in the negative control group may be due to the cessation
of its conversion into T3 hormone within the tissues, which leads to an increase in its concentration in
the blood (31). Or the reason for the high T4 hormone may be due to the ability of raw algae to stimulate
the secretion of thyroid hormones (32), This is through the effect of the extracts on the receptors
designated for binding to the TSH hormone, which is located on the surface of the basement membrane
in epithelial cells, at the level of activation of the adenyl cyclase enzyme located in the cell membrane,
which increases the production of cAMP in the cell (30). Thus, cAMP plays a role as a secondary carrier
to activate the basic enzymatic system of thyroid cells, and this process results in a rapid increase in the
secretion of thyroid hormones, including T4 (28).
• Measuring the levels of antioxidants and oxidative stress of the samples under study:
Table (2) shows the average ± standard deviation of antioxidants and oxidative stress for
the samples under study.
Groups Mean ± SD
C1 C2 G1 G2
Parameter
n =28 n =28 n =28 n =28
34
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Table (2) shows that the mean ± standard deviation of the glutathione level for the positive control
group was (2.408±0.219) micromol/L, while the negative control group showed (1.510±0.103)
micromol/L and treated with thiourea. As for groups G1 and G2, they reached ( 1.880±0.126) and
(1.756±0.116) micromol/L, respectively, treated with raw vesicular focus
The results showed that the average level of glutathione decreased significantly in the negative control
group compared to the positive control group, and it also decreased significantly in groups G2 and G1
compared to the positive and negative control groups and at the probability level (P ≤ 0.05) , as in
Figure (4).
The literature did not indicate the effect of a treatment attempt for hypothyroidism using Fucus vesica
(9)
algae on the level of glutathione, but the results were inconsistent with the results of . While the
(33)
results agree with Muhaemin , who observed an increase in the level of glutathione as a result of the
influence of strains of algae. Chlorella allipsoideq، Scenedsmus acutus، Scenedesmus dimorphus
The reason for the decrease in the level of glutathione in the negative control group may be attributed
to the effect of thiourea, as it is a toxic substance to liver cells and other tissues. The reason for the
decrease in the level of glutathione in group C2 compared to C1 may be attributed to the fact that
thiourea may have caused a deficiency in the raw materials for its construction, especially the
coenzyme. (Reduced form) Nicotinamide adenine dinucleotide phosphate (NADPH) produced by the
pentose phosphate pathway Which is the catalyst for the action of the glutathione reductase enzyme,
35
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
which works to restore the active form of glutathione from the inactive form (34). Or it may be due to
the fact that thiourea led to the consumption of glutathione, which is one of the most important non-
enzymatic antioxidants in removing free radicals and their products. Then it is transformed from the
active form to the inactive form, glutathione disulfide. The sulfur group in the glutathione synthesis is a
good reducing agent, as a hydrogen atom is blown away. Easily due to the weak bond between sulfur
and hydrogen (S-H) and the strong bond between carbon and hydrogen (C-H). In free radicals, it
protects cell membranes from free radical damage (35). The reason for this decrease in the concentration
of glutathione may also be attributed to the fact that hypothyroidism resulting from thiourea leads to an
increase in oxidative stress and a decrease in the GSH-GSSG ratio, as well as a decrease in the
effectiveness of the enzymes catalase and superoxide dismutase, as well as its possible effect on the
liver, as it can cause damage to the liver cells. Causing hepatic damage, which leads to an increase in
free radicals and active oxygen species (ROS) and a decrease in the concentration of glutathione in
blood serum (36).
level of malondialdehyde
Table (2) shows that the average ± standard deviation of the MDA level for the positive control group
was (1.560±0.201) micromol/L, while the negative control group showed (3.474±0.312) and those
treated with thiourea. As for groups G1 and G2, it amounted to (2.282±0.214). Micromol/L,
(2.768±0.259) Micromol/L, respectively, treated with raw fucus.
The results showed that the average MDA level increased significantly in group C2 compared to group
C1, and groups G2 and G1 recorded a significant increase at the probability level (P≤0.05) compared to
the positive and negative control group, as in Figure (5).
The literature did not indicate the effect of a treatment attempt for hypothyroidism using Fucus vesica
moss on the level of malondialdehyde, but the results agreed with the results of Al-Samarrai (9).
The reason for the high concentration of malondialdehyde is attributed to the fact that thiourea may
have caused an increase in the speed of consumption of antioxidant defense systems, leading to tissue
damage (37). The increase may also be due to an increase in the activity of free radicals that exceed the
36
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
ability of antioxidants to remove or neutralize them, causing an increase in lipid peroxidation and thus
leading to an increase in the level of MDA and a loss of the balance between the effectiveness of free
radicals and the activity of antioxidants, which leads to a loss in the elasticity of cellular membranes
(38)
. The reason may also be that the state of oxidative stress may affect the pancreatic β-cells and
insulin secretion and thus lead to a decrease in the concentration of insulin in the blood. This stimulates
and increases the activity of the enzyme Fatty acyl CoA oxidase, which stimulates
The process of β-oxidation of fatty acids and increased hydrogen peroxide formation and ultimately
increased rates of lipid peroxidation and malondialdehyde production (39).
However, the reason for the decrease in the level of malondialdehyde in the groups treated with raw
moss may be due to the fact that Fucus vesica contains active and protective compounds that have an
important role in reducing oxidative damage and its ability to scavenge free radicals, as increasing the
concentration of substances is proportional to the ability to reduce levels of oxidative stress. By
reducing the level of malondialdehyde (40).
Histological study
The results of the current study showed the effect of thiourea on the tissue of the thyroid gland, as it
was observed that necrosis and rupture occurred in the colloidal vesicles of the connective tissue of the
gland, with the observation of fibrin deposition in the blood vessel, as shown in Figure (6) compared to
Figure (7), in which the gland cells appeared normal, as Connective tissue barriers between the
colloidal follicles (normal follicle cells and blood vessels) appear normally, and part of the parathyroid
gland tissue appears.
Figure (8) shows for the group treated with raw algae extract at the lower concentration, the
appearance of necrosis in the colloidal vesicles and deposition of fibrin, while the cells in Figure (9)
appeared almost normal and the necrosis and dehiscence disappeared, with no fibrin deposits observed
in the blood vessel when treated with the higher concentration of the extract. Raw algae, which is rich
in antioxidants, which work to protect thyroid cells and body cells from the danger of free radicals
resulting from treatment with thiourea.
37
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Figure (6): A cross-section of the thyroid gland showing the connective tissue barriers between the
colloidal follicles (normal follicular cells) and the blood vessels normally, with part of the gland
observed next to the normal thyroid gland for the positive control group (C1) x 200 (HE).
Figure (7): Cross-section showing necrosis and rupture of colloidal vesicles and connective tissue with
fibrin deposition in the blood vessel of the negative control group (C2)
Figure (8): A cross-section showing necrosis in colloidal vesicles, noting necrosis and fibrin deposition
next to the thyroid gland for group G1
References
1- Siham A. Salim, Ahmed A. Kadhim, Said T. Said. Investing of plant tissue culture technique in producing of
active compounds from medicinal plants .Journal of Education and Scientific Studies, 2023, Volume 4, Issue 21,
Pages 13-22.
38
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
3- MarwA A. Aubaeed , Amjed Mirza Oda , Emad Y.A. AL-Sultan Isolation and Classification of Green Alga
Stigeoclonium attenuatum and Evaluation of its Ability to Prepare Zinc Oxide Nanoflakes for Methylene Blue
Photodegradation by Sunlight .Baghdad Science Journal, 2023, Volume 20, Issue 4, Pages 1200-1209.
4- Ibrahim Hade Mohammed, Anfal Kadhim Abed, Qutaiba Hafedth Nsaif, Zena Taha Abud hafez .The
Cytotoxic Activity Chara elegans on Growth of same Cell Lines .Diyala Journal of Medicine, 2018, Volume 14,
Issue 2, Pages 9-16.
5-Hameed,RR.; Atya,K.F. and Mohameed, M.A. 2014,Role of fucuse vesiculosus extract in the reagulation of
thyroid hormone status in adult male rabbits. Kerbala JourAl-Saadi Hussein Ali, Suleiman Nidal Idris, 2006,
Algae Science, Al-Yazouri Scientific Publishing and Distribution House, Amman, p. 68.nal of pharmaceutical
sciens. 7:67-84.
6-Al-Saadi Hussein Ali, Suleiman Nidal Idris, 2006, Algae Science, Al-Yazouri Scientific Publishing and
Distribution House, Amman, p. 68.
7-White, N. 2000,Fucus vesiculosus Bladder wrack. Marine Life Information Network: Biology and Sensitivity
Key Information Sub-programme. Plymouth: Marine Bio. Ass. of the Uni .Kingdom.
8-Stanely P.; Prince M.; Menon,V. and Pari L1998. Hypoglycemic activity of syzigiumcumini seeds : effect on
lipid peroxidation in alloxan diabetic rats. J. Ethno Pharmacol. 61: 1 – 7.
9-Al-Samarrai, Maha Attia Muhammad . 2013. Histochemical study of the alga Fucus vesiculosus and its effect
on the level of thyroid hormones and antioxidants in the blood serum of adult white rabbits, Master’s thesis.
Samarra University/Faculty of Education.
11- Singh, B.; Sundar, S. and Shukla, A. (2021): Herbal Medicines for Thyroid Diseases In Treating Endocrine
and Metabolic Disorders With Herbal Medicines IGI Global, 256-277.dol: 10.4018/978-1-7998- 4808-0.ch011.
12- Aufaira Shaker Nsaif, Hadeel Delman Najim, Noor Thair Tahir .Prevalence of Overt and Subclinical Thyroid
Dysfunction among Iraqi Population in Baghdad City .IRAQI JOURNAL OF COMMUNITY MEDICINE,
2020, Volume 33, Issue 1, Pages 20-24.
13- Gaucher C, Boudier A, Bonetti J, Clarot I, Leroy P and Parent M. Glutathione: antioxidant properties
dedicated to nanotechnologies. Antioxidants. 2018 ;27:7(5):62.
39
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
14- Teskey, G., Abrahem, R., Cao, R., et al . Glutathione as a marker for human disease. Advances in clinical
chemistry, 2018; 87: 141-159.
15- Bansal, A., & Simon, M. C. Glutathione metabolism in cancer progression and treatment resistance. Journal
of Cell Biology, 2018; 217(7):2291-2298.
16- Arya A, Chahal R, Rao R et al. Acetylcholinesterase inhibitory potential of various sesquiterpene analogues
for Alzheimer’s disease therapy. Biomolecules. 2021 ; 25:11(3):350.
17- Youssef, Hanan, and Hala Salem. "Oxidative stress parameters in patients with breast cancer before and after
radiotherapy." Egyptian Journal of Radiation Sciences and Applications .2019; 32.2: 177-185.
18- Rioa D. D, Stewartb A. J, Pellegrinia. A review of recent studies on malondialdehyde as toxic molecule and biological
marker of oxidative stress. Nut.Meta. Card. Dise. J. 2005;15 (4): 316-8.
19-Buddi R, Lin B, Atilano S. R, Zorapapel N. C, Kenney M. C, Brown, D. J. Evidence of Oxidative Stress in Human
Corneal Diseases. J. Histo. chem. Cyto. Chem. 2002; 50(3): 341–351.
20-Braverman , L. E.; 1996,Evalution of thyroid status in patients with thyrotoxicosis . Clin. Chem. 42 : 174-181.
21-Mazzafferi , E. L. and Gharib , H. 1998.Thyroxine superessive therapy in patients with nodular thyroid disease . Ann.
Intem. Med. 128 : 386-394.
22-Fisher, D. 1996.A Physiological variations in thyroid hormones. Physiological and Pathogological considerations. Clin.
Chem, . 42:
23-Tietz,N. W. Textbook of clinical chemistry. 3rded. C.A.Burtis, E.R. Ashwood ,W.B.Saunders. 1999; 819-861,1245-
1250.
24-Sedlak,J. and Lindsay,R. H. Analytical biochemistry. pp: 192. Cited by Al-Zamyle 2001.
25-Al-Rawi, Khashi Mahmoud. Introduction to Statistics, second edition, College of Agriculture and Forestry, Mosul, 2000.
26-Paynter, O. E., Burin, G. J. and Jaeper, R. B. (1988). Goitrogens and thyroid follicular cell neoplasia : evidence for
a threshold process.Regul. Toxicol. Pharmacol; 8(1):102-109.(Abstract).
28-Kedari ,G. S. 2011,REvaluation of the Thyroid Status, Oxidant Stress and Antioxidant Status in patients with
Type - 2 Diabetes Mellitus. India Journal of Clinical and Diagnostic Research. 5(2):254- 256 -255.
29-Chandra, A.K., mukhopadyay, S., Lahari,D. and Tripathy, 2004,SGiotrogenic content of Indian cyanogenic plant
foods and their in vitro anti–thyroidal activity. Indian J. Med Res . ; 119 : 180–185.
30- Guyton, A. C. and Hall, J. F. 2000.Textbook Medical Physiology. 10th ed., W.B. Saunders Company, Philadelphia. :
858-868.
31- Shamma, H. A. 2000. Optimal Health, Naturopathy, Phytomedicine and Nutrition Supplements. 1st ed., Washington
D.C. 304-307.
40
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
32-Guyton, A. C. and Hall, J. F.1996. Textbook of Medical Physiology. 9th ed., W. B. Saunders Company, Philadelphia.
945-954.
33-Muhaemin, M. The glutathione diurnal cycling in Dunaliella Salina . J.COAST. DEV.2008 ;(12) ;1410-217.
34-Onderwater R.C.; Commandeur, J.N.; Groot, E.J.; Sitters,A,Mengae,W.M.and vermeulen,N.p. cytotoxicity of a series
of mono- and di substituted thiourea in freshly isolated rat hepatocytes Toxocology 1998;125(2):117-29.
35-Al-Hasani, Owais Muwaffaq Hamed. The effect of infection with a number of cancerous tumors on lipid
peroxidation, glutathione levels, and a number of variables in blood components. Master's thesis, College of
Science, University of Mosul, 2004.
37- Tietz , N.W.; Fandamental of clinical chemistry 3th Ed.,saunderes .Toxcol ,Enco.2000;19(3):201-213.
38-Sies, H. Oxidative stress: introductory remarks. Sies H., ed. Oxidative stress. New York: Academic, 1995:1
– 8.
39-Kakkar, R. ; Kalra, J. ; Mantha, S. V. and Prasad, K. Lipid peroxidation and activity of antioxidant
enzymes in diabetic rats. Mol. Cell. Biochem. 1995;151: 113 –9.
40- Giełdoń, A.B.; and Ryłko.E. Estimation of Metallic Elements in Herbs and Spices Available on the Polish
Market.J Environ Stud.2013;22 (4):1251-56.
41
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Biology Depertment, College of Education for pure Sciences, Tikrit University, Iraq
42
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Biology Depertment, College of Education for pure Sciences, Tikrit University, Iraq.
Abstract
The study aims to determine the extent of the effect and antibiotics on Shewanella putterfaciens, 90
sample were isolated from urinary trace patients who were hospitalized and admitted to AL-Alam
Gerneral Hospital, five infections were diagnosed with this bacterium. The diagnosis was made based
on microscopic, morphological, chemical and physiological examination and using the API 20E system,
Than , a sensitivity test was conducted for both aqueous and alcoholic extracts of the garlic plant at
the following concentrations (25, 50, 100)%, where the results for the aqueous extract showed (8, 10,
12)mm, respectively , while the result for the alcoholic extract showed percentages (12, 13, 15)mm at
the same concentration as above.
A sensitivity test to some antibiotics was conducted, and the results of the study showed the
sensitivity of bacteria to the following antibiotics (Ciprofloxacin. Ceftriaxona. Gentamicine.
Azithromycin) in the rate of 100%, while the bacteria showed sensitivity to the antibiotic Amikacin in
the rate of 70%, as for the Penicillin , Cefotarxime in the rates of 20% and 25% respectively, while
anti Amoxicillin it was his percentage 0%.
المعزولة من التهاب المسالك البوليةShewanella putterfaciens تأثير مستخلص نبات الثوم والمضادات الحيوية ضد بكتريا
الخالصة
Shewanella putterfaciens تهدف الدراسة إلى معرفة مدى تأثير كل من مستخلص نبات الثوم والمضادات الحيوية على بكتريا
تم, إصابات بهذه البكتريا5 شخصت, عينة من مرضى المسالك البولية الراقدين والمراجعين لمستشفى العلم العام90 حيث تم عزل.
ثم تم إجراء اختبار الحساسية لكل من.API 20E التشخيص اعتمادا على الفحص المظهري والكيميائي والفسلجي وعن طريق نظام
,10 ,8( حيث ظهرت نتائج المستخلصات المائية كما يلي%)100 ,50 ,25( المستخلص المائي والكحولي لنبات الثوم عند التركيز
. )ملم على التوالي عند نفس التراكيز أعاله15 ,13 ,12( بينما أظهرت نتائج المستخلص الكحولي النسب التالية,) ملم على التوالي12
حيث أظهرت نتائج الدراسة حساسية البكتريا تجاه المضادات التالية, تم إجراء اختبار الحساسية لبعض المضادات الحيوية
بينما أظهرت البكتريا حساسية تجاه مضاد, %100 ) بنسبةCiprofloxacin . Ceftriaxona. Gentamicine. Azithromycin(
بينما كانت مقاومة لمضاد, على التوالي%20 , %25 نسبةPenicillin , Cefotarxime وتجاه مضادي%70 بنسبةAmikacin
. %0 بنسبةAmoxicillin
43
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Introduction
Urinary tract infections are the second most widespread and common diseases after respiratory
infection and are among the disease related to people(1). The number of people infected by it reaches
millions, including males and females if all ages(2). Females are more susceptible to infection than
males, because the urethra s closer to the anus, and germs are transmitted to it and cause infection(3).
Studies have shown that there is an increase in antibiotic resistance due to the continued frequent and
inappropriate use of antibiotics by people(4). Shewanella spp bacteria is a facultative anaerobic,
heterotrophic, gram negative, rod shaped bacterium that occurs naturally in water(5). Garlic belongs to
the Allium family and is closely related to onions and leeks. It has a strong, piquancy taste and is
widely used (6). It consists of active compounds such as phenolic, sulfur and cytonin compounds that
effect bacteria (7). The aim of the research:
Knowledge effect antibiotic and Allium plant extract on growth the bacteria.
Samples were collected for a period of 3 months from people visiting and lying in Al-Alam Hospital,
after explaining the method of taking the sample and mentioning the notes on the sample package,
including name, age, gender and time of taking the sample (8). After that, the sample was examined
microscopically to see the sediments and determine whether the sample was infected or not, we then
planted it on MacConkey and Blood and EMB Agar medium and incubated at 37˚ degree for 24h, after
bacteria growth, we isolated it and conduct the biochemical test of IMViC and the tests oxidase and
catalase to diagnose it as well as the work of chromium dye to determine its shape and methods of
collection and thus depends on official characteristics and biochemical tests of the diagnosis (9). Also,
we used the system API 20E make sure of the diagnosis (10).
The sensitivity of this bacteria to some antibiotics was tested according to the Kirby-Bauer method
on Muller Hinton agar medium depending on Clinical Laboratory Standards institute (11). The
antibiotics tested in our study for which the antibiotic name and concentration are listed in table (1)
44
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Allium extract (Aqueous and Alcohol) on Shewanella puterfaciens used to determine their effect on
it, the garlic plant was placed in balanced quantities in water and another in alcohol and incubated with
a humidifier for 24h at 37 degree , then filtered with a humidifying solution and placed in a centrifuge
with 3000/5000 rpm
In the current study, 90 sample were collected from the urine of people with UTI , and the bacteria
appeared as 5 sample of the germs causeing the disease. After examinining and diagnosing the
Shewanella puterfaciens bacteria, it showed the following characteristics:
_ + + fermentative + _ _ _
+ + _ +
Many bacteria have many ways to resist antibiotics, and these defense methods include biofilms,
capsules, and other. In our current study, we took some antibiotics CTX, CTR, P, AM , AK, AZM,
GM, CIP and DO. Table 3 shows the rates of bacterial resistance to antibiotics
% % % % % % %
CTR P
% %
45
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
100% 25%
The bacteria showed high sensitivity to each of the following antibiotics, GN, CIP, AZM and CTR ,
the results showed a sensitivity rate of 100% , this is the highest percentage, while the rate of sensitivity
to an antibiotic AK was 70% , sensitivity showed low rates to each of the following antibiotics CTX
and CIP was 20% and 25% , while the percentage was 0% for anti AMC, these are the lowest result
that appeared to us. No similar research was available for the purpose of comparing the result.
The result of the current study showed that the alcoholic extract of the garlic plant has stronger
effectiveness in inhibiting bacterial growth, table 4 shows that the diameter inhibition of the alcohol
extract in this bacteria, it appeared that the highest diameter of inhibition at the concentration of 100% I
was reached 15mm, and less diameter of inhibition at the concentration of 25% I was reached 12mm,
while the highest diameter of inhibition of bacteria in the aqueous extract was at the concentration of
100% I was reached 12mm, and less diameter of inhibition at the concentration of 25% I was reached
8mm.
Table 4 the inhibition zone % alcohol and aqueous extract against bacteria (mm)
25 50 100 25 50 100
8 10 12 12 13 15
46
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
References
1-Gupta, B. Trautner.(2012). In the clinic Urinary tract infection, Annals of Internal Medicine, 156, ITC1-16.
2- Ahmad, W,; Jamshed, F. and Ahmad,W(2015). Frequency of Escherichia coli in patients with community
acquired urinary tract infection and their resistance pattem against some commonly used antibacteriales. J. Ayub.
Med. Coll. Abbottabad.; 27(2): 333-337.
3- Hussein, A. K.; Palpitany, A.S. and Ahmed, H.S(2014). Prevalence of Urinary tract infection among
Secondary School Students in Urban and Rural in Erbil: Comparative Study. Kufa J for Nuesing Sciences, 4(3).
4- Ouno, G. A.; Korir, S, C.; Joan, C. C.; Ratemo, O. D,; Mabeya, B. M.; Mauti, G. O.; et al(2013). Isolation,
identification and characterization of urinary tract infectious bacteria and the effect of different antibiotics. J
Naturl Sci Res, 3(6), 2224-3186.
5- Serres (2006). Genomic Analysis of Carbon Source Metabolism of Shewanella oneidensis MR-1: Predictions
versus Experiments, Journal of Bacteriology.
7- shang A, Cao SY, XU. Xy, Gan RY, Tang Gy, Corke H, Mavumengwana V, Li HB(2019). Bioactive
compound and biological functions of Garlic (Allium sativum).
8- Vandepitte, J.; Verhaegen, J.; Engbaek, K.; Rohner, p., point P. and Heuk, C.C (2003). Basic laboratory
procedures in clinical bacteriology. Geneva : World Health Organization.
9- Leboffe em, M. J. and pierce, B.E(2011). Aphotographic Atls of the Microbiology Laboratory, 4ͭ ͪ ed, USA.
Pp: 58-64, 78-96, 96-99, 153.
10- Atlas, R.M.(1995). Principle of microbiology. 1 st ed. Mosby-Year book, Inc. St. Louis. USA.
11- CLSI.(2021). Performance Standards for Antimicrobial Susceptibility Test; 31st edition. CLSI supplement
M100. Clinical and laboratory institute, USA.
47
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
48
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Abstract:
The research aims to activate the role of information and communication technology in improving
health services in private hospitals / Baghdad. Information and communication technology represents
the backbone of organizations in the current era, especially health organization s, as modern medical
technologies are one of the requirements for adapting to the modern health environmental reality.
Patient-related data has become digitally transferred between hospitals without the need for physical
documents and transferred in the usual traditional ways, etc. The hospital only has to press a button to
view the electronic medical file and the pictures and reports it needs on the health condition
automatically and quickly, as it is not possible to achieve a high level of health service without the use
of this information technology, as its use achieves high quality in the health service provided to
patients, and this It means the necessity of correlation between the availability of medical technologies
and their achievement of health service quality. The research sought to explain the role of modern
information and communication technology in achieving health service quality in health organizations.
The research sample was passed to 70 employees, including 28 male and 42 female employees. Coding
the variables and entering them into the statistical program SPSS to analyze the data of the research
under study. It was found that there is a correlation between information technology and the quality of
health service, as information technology significantly affects the dimensions of health quality. The
sample of the study was the International National Hospital and the International Hospital in Baghdad
Governorate. The study concluded that This technology has an effective and important role in
improving health services in hospitals.
Keywords: Information and communication technology; health service; Quality of health services.
49
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
1. Introduction
The human being is the goal of development, as well as its means, and health is the first human
requirement and the most important component of life. The reality is that the health of the citizen is the
most precious thing that societies possess, and it is a wealth that must be preserved. Therefore, it seeks
Man since ancient times has sought to develop treatment and search for... Healing until medicine has
reached the level of progress we have now, and researchers are still searching for further development
in medicine using all available means of science, the most important of which is information and
communication technology. Therefore, health institutions are among the institutions that most need to
ensure and improve their services, especially after... D Progress in medical science and knowledge and
successive scientific discoveries, including the development of devices and technologies, the spread of
diagnostic technology and telemedicine, the spread of competition in health services between research
and medical centers, and the emergence of donor institutions. ED, which sets quality standards to
improve health services, and Therefore, the issue of improving and developing the service or searching
for new services becomes one of the prominent features in the work of the health institution to keep
pace with the speed of scientific and technological change in the field of medicine, which makes some
of the health services provided obsolete over time and with the increase in the number of patients and
the demand for a quick response to their requirements and needs. Accused of addition To increase the
improvement of health and medical services provided to them, all of this made it necessary for those in
charge of managing the quality of health services to find means and ways to meet these requests and
respond to them, which led to the adoption of the use of information and communication technology in
these health institutions, as Computers have become Automation and information technology are a
basic means of work and management, especially in the field of health information management,
storage, processing, and retrieval. With the development of health information systems and technology,
it has bridged distances in a way that humans have never known before, and has enabled the storage of
digital data and It also provides the ability to process this data at high speed, which helps provide
extremely important information to decision makers.
50
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
1. The importance of improving health services because of their direct impact on human health.
2. The widespread and widespread use of information and communication technology because of its
impact on the time and cost factor.
3. Seeking to highlight the benefits and feasibility of using information and communication to
improve health services for private sector hospitals in light of the problems facing the sector and
the challenges and competition it faces.
1. Explain the importance of information and communication technology in health institutions and
its impact on health services.
2. Knowing the extent of activation of information and communications technology in health
institutions and its impact on improving health services.
3. Identifying the most important needs of health institutions in order to be able to provide
recommendations and suggestions that help improve the quality of health service through
enhancing communication technology.
4. Providing solutions that can contribute to improving the quality of service in the sector.
5. Identify and analyze the relationship between information technology and health service quality.
1.4 Research hypotheses
The research was based on two main hypotheses:
⮚ The first main hypothesis: There is a significant correlation between information and
communication technology and the dimensions of health service quality:
The following sub-hypotheses:
1. There is a significant correlation between the physical equipment and the dimensions of the
quality of health services.
2. There is a significant correlation between the software and the dimensions of the quality of
health services.
3. There is a significant correlation between databases and dimensions of the quality of health
services.
4. There is a significant correlation between communication networks and the dimensions of the
quality of health services.
5. There is a significant correlation between human resources and the dimensions of the quality of
health services.
⮚ The second main hypothesis: There is a significant impact relationship between information and
communication technology and the dimensions of health service quality.
The following diagram shows the hypothetical diagram of the research, as it indicates the relationship
between the variables, if the independent variable (information and communication technology) and the
dependent variable (quality of service) are determined, as shown in Figure (1).
51
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
In order to reach the specific objectives, reliance has been placed on the descriptive and analytical
approach that is compatible with this type of studies, which is based on collecting apparent quantitative
facts and data to be studied, by defining the theoretical framework for the subject of the study and
reviewing the studies that dealt with this subject and the experimental approach through the applied
chapter on The method of case study, which enables one to delve deeper into the various aspects of the
subject and reveal its dimensions through field visits to the institution under study. As for the research
and study tools, we relied on a number of diverse sources and references. We also used observation as a
means of research, in order to directly diagnose the reality of the institution to know The reality of
applying information and communication technology in health institutions and the extent of its
contribution to improving health services. We then analyzed the results of the interview we conducted.
✔ Spatial boundaries: The research was applied in hospitals in the private sector (International
Hospital, International Hospital.
✔ Time limits: which is represented by the period for starting the preparation of the theoretical and
applied aspects of the research from the date (12/15/2022 to the date (5/28/2023).
1. The research community: The private health sector was chosen to implement the applied
aspect of the research, as the community was represented by the International National
Hospital and the International Hospital in Baghdad Governorate.
2. Research sample: A random sample consisting of (70) individuals from the hospital staff in
all departments was selected. Table (1) shows the characteristics of the research sample
members in terms of (gender, age group, number of years of service).
52
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
40 % 28 male Gender
60% 42 female
The ready-made statistical program (SPSS) was used to analyze the data in the practical side of the
research, as follows:
1. The arithmetic mean to determine the level of answers in the research sample.
2. Standard deviations to measure the degree of dispersion of the sample’s answers from their
arithmetic means.
3. Correlation coefficient to determine the degree of relationship between variables.
4. Simple regression analysis to measure the effect.
Many studies included the concept and application of the role of information and communication
technology in improving the quality of services in different countries of the world. The researchers
reviewed previous studies and research related to the topic of research with the aim of identifying
the most important results and general indicators that resulted from those researches and studies.
The following is a review of some of these. Studies:-
1. A study by Dr. Alaa Farag Hassan Radwan (2021), entitled: “The role of patient dealing skills
in improving the level of health service quality” (an applied study on patients dealing with
Menoufia University hospitals). This study aimed to measure the effect of the skills of dealing
with patients, verbal communication, non-verbal communication, listening, and persuasion on
53
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
the quality of health service (responsiveness, reliability, empathy, material aspects, assurance).
The study was applied to a sample of (264) individual patients. Visitors to Menoufia University
Hospitals. The field data necessary to conduct the study was collected using a survey list, and
the stability and validity of the measures used in the study were confirmed by relying on
confirmatory factor analysis and the Cronbach coefficient. The study concluded: There is a
positive moral effect for all skills in dealing with patients. The results showed that there is a
significant positive effect for all dimensions of skills in dealing with patients, and there is also a
positive moral effect for communication skills, whether verbal or verbal, for the health service.
On the physical aspects dimension of health service quality dimensions, and finally, the results
showed that there is a positive moral effect for each dimension of patient dealing skills on the
assurance dimension as one of the dimensions of health service quality.
2. A study by Ammar Muhammad Zuhair Tinawi (2019), entitled: “The role of the use of
information technology in improving the quality of services provided at the telecommunications
company (MTN & Syriatel).” The study reached a number of results, the most important of
which is the existence of a significant relationship between the use of information technology
and the dimensions of quality. The service represented by (the dimension of tangible physical
aspects, the dimension of reliability or credibility, the dimension of speed of response and
customer assistance, the dimension of trust and security (warranty), the dimension of empathy
with the customer), whether partially with each dimension alone, or with all dimensions
combined.
3. Study by Yahyaoui Elham et al. (2016), entitled: “The importance of using information and
communication technology in improving the quality of higher education at the Algerian
university.” The study aimed to use information and communication technology to improve the
quality of higher education at the Algerian university, leading to the spread of education and
improving its level, reducing costs, continuous improvement of the role of the professor,
teaching methods, and artificial intelligence for education, and achieving the highest possible
levels in practices and processes, including obtaining highly efficient outcomes.
4. Study by Muammar Muhammad Ambia Al-Toumi (2017), entitled: (The impact of information
and communications technology on improving the quality of banking services for Libyan
commercial banks: a field study). The study aimed to identify the impact of information and
communications technology on the quality of services provided to clients of Libyan commercial
banks, and to identify At the level of information and communications technology used, the
study concluded that there is a statistically significant impact of information and
communications technology on the quality of services provided to clients of Libyan commercial
banks.
This aspect addresses the theoretical framework of research from all aspects, as recent times have
witnessed rapid and unprecedented developments in all aspects of life. The most prominent of these
developments that have distinguished our current time is the dynamism that the technological field
has known, especially those related to processing and disseminating information, or what has
become known as information technology, and it is considered According to current developments,
information and communication technology is a new form of means that keeps pace with
developments and many paths.
54
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Rowley defines information and communication technology as: “collecting, storing, processing,
and transmitting information using information. This is not limited to hardware equipment or
software, but also to the importance of the role of man and the goals he seeks from the application
and use of these technologies and the values and principles he resorts to to achieve.” His
experiences. (Yasser Abd. Djawad: 2018)
Communications are important for the success and achievement of understanding and
cooperation between communicating individuals and groups. The communication process
represents one of the basic elements in human interaction. Through communication systems,
institutions have been able to achieve tangible progress in various aspects (socially, economically,
etc.). (Abdul Hadi, K: 2018).
1. Interactivity: This means that the one who uses these technologies is independent and a
transmitter at the same time, and that the parties in the communication process can exchange roles,
and this is due to a kind of effectiveness between people, institutions and other groups.
2. Not limited by time: This means that messages can be received at any time, such as in the case of
e-mail (E-MAIL).
4. Mobility: This means that the user can benefit from services during his movements, such as a
laptop computer and a mobile phone.
5. Globalization: It is the environment that activates these technologies because it uses more space
in any part of the world and allows the flow of information capital in the information capital. Its
decentralization has allowed it to flourish in the global environment, especially in trade exchange,
which allows it to transcend the problem of time and space. (Dr. Qassim N:2020).
55
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
2.3 IT Infrastructure:
“The term ICT infrastructure in its traditional definition refers to communications networks that
specifically provide traditional fixed-line telephone service, and which meet a basic human need,
which is the need for remote communication. However, in the twenty-first century, the amazing
development of technology and the accompanying growth of the system The needs of the modern
era have raised the term and deepened the concept of IT infrastructure and given it dimensions that
were not known or even imaginable in the past.
Laudon and Laudn also define IT infrastructure as: “the shared technological resources that provide
the basis for information system applications in the company.” (Saleem, Farrukh:2020)
rules that govern interaction between individuals in general and in disease situations in particular.
The degree of quality in this element is measured by the extent to which health service providers
meet expectations. And the needs of patients, and also in terms of comfort and pleasure
requirements in the stay, as they complement the social and psychological aspects. The service can
be measured from non-measurable aspects, by directing survey lists to customers, and the questions
are easy, simple, and closely related to the subject of the service, as It can be analyzed
appropriately, and ensuring service quality may be more than ensuring quality for tangible goods
and products, due to the characteristics of the service.
2.6 Health Gap Scale
It is called the (Servqual) scale and is based on health service quality as the appropriate and
suitable performance for measuring quality in service hospitals by measuring patient satisfaction.
This scale was developed by (Parasuraman etal 1988 and Perry). This approach starts from the
premise that the quality of service provided is determined conclusively. In the difference between
the patient’s expectations and his perceptions of the service provided, here the quality of service can
be defined as (the gap), which is equal to the extent of the patient’s perception of the quality of the
service.( Chimango Nyasulu:2018)
Or his evaluation of the overall service provided to him as excellent or superior, and it is considered
the cornerstone in measuring the quality of health service. Accordingly, the gap takes three basic
forms:
✔ If the patient’s perception of the service actually provided is superior to the service that the
patient expects, then the gap here is positive, which means that the patient gets more health services
than he expects from the hospital. .
✔ If the quality of the health service provided (the perceived gap) is equal to the patient’s
expectations, then the gap will be equal to zero, which means that the hospital has paid attention to
the patient’s expectations for the quality of health services, and has developed its health services
towards customers in a way that matches their expectations.
✔ If the expected quality (gap) is negative, this means that what the patient gets from
health services is different from what he expected from the hospital, which means that the hospital
failed to anticipate the patients’ desires for the quality of health services, and therefore did not
provide them with the services they desired. (Al-Zubaidi:2018) (Gargvanshi, Prasenjit:2020)
2.7 The impact of information and communication technology on the health service:
(Hammadi, Majed:2018)
The introduction of information and communications technology into the health sector has a
significant impact on various aspects of health service provision, from improving quality to
achieving effectiveness and ease of access. This is in addition to the advantages and benefits that
accrue to the organization, the citizen, and public health more broadly. However, this does not mean
that there are no obstacles that hinder application, in addition to negatives about it.
❖ Advantages of applying information and communication technology in the health
field: (Sittig, Dean: 2015)
Information and communication technology plays an increasingly important role in providing
health services. These advantages benefit the doctor, the patient, health care workers, and citizens
in general alike. Each of them benefits from this technology, and perhaps the most important
advantages are the following: -
1. Increase work efficiency and effectiveness.
57
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
58
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Table (2): Description and diagnosis of the individuals in the research sample for the independent
variable (information and communication technology)
Software
5 The hospital is working to develop capabilities in 4.2 0.911 84%
the field of information technology with the aim
of improving performance
6 Information technology provides the doctor with 4.60 0.671 %92
knowledge of the analysis available in the
hospital while he is present in his department and
is able to determine the analysis required to be
performed on his patient.
7 The hospital provides all information about new 4.6 0.671 92%
services on an ongoing basis thanks to
information and communication technology.
8 Information and communication technology 4.17 0.902 83.50%
contributes to overcoming the difficulties faced
by the patient.
9 The hospital works to quickly transfer 4.67 0.525 93.50%
information between different departments and
administration based on information technology.
Database
10 The hospital maintains accurate electronic 4.6 0.671 92%
records about patients' medical reviews and
consultations.
11 Information and communication technology 4.55 0.714 91%
contributes to the possibility of organizing work
with patients and managing relationships well.
12 The hospital works to organize dealing with 4.75 0.493 95%
patients and managing relationships with them
using elements of information and
59
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
3.1.2 Testing the level of importance of the dependent variable (improving health services) from
the point of view of the research sample
This paragraph includes the presentation and analysis of the responses of members of the research
sample on the dependent variable (improving health services), relying on a five-point Likert scale.
60
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Table (3): Description and diagnosis of the individuals in the research sample for the dependent
variable (improving health services )
N the question mean standard Relative
deviation importance%
Dependability
24 Information and communication technology 4.32 0.828 86%
contributes to the speed and quality of service
provided
25 The hospital and its employees are committed to 4.27 1.061 85%
providing the best services to patients
26 Patients place their trust in medical specimen 4.6 0.671 92%
skills confidently and safely
27 Hospital workers have the knowledge and 4.27 0.846 85%
experience to answer all referral inquiries
28 There is interest on the part of the hospital and its 4.47 0.816 89%
employees in the manner and form of work
clothing that is appropriate to the level of service
provided
Response
29 The hospital administration works to resolve 4.45 0.932 89%
complaints quickly and effectively
30 The hospital pays attention to cleanliness, 4.2 0.822 84%
lighting, air conditioning, the necessary medical
equipment, and providing an appropriate physical
environment
31 There is a sufficient number of doctors and 4.32 0.944 86%
nurses who provide services to patients
32 The service provided is at the level that the 4.00 0.905 %80
patient expects
33 The hospital cooperates with patients when a 4.27 0.715 85%
problem occurs
34 The hospital administration sympathizes with 4.27 0.846 85%
patients when they submit complaints as you
expect in your mind
Location
35 The interior design of the hospital provides a 4.55 0.749 91%
comfortable atmosphere for patients
36 The hospital administration is interested in 4.32 0.693 86%
providing services in a limited time, quickly and
accurately
37 The hospital administration is committed to its 4.3 0.686 86%
promises to patients in the field of therapeutic
health services and providing the appropriate
61
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Table (4) Spearman correlation matrix from the point of view of the research sample
Information and B5 B3 B2 B1 B
communication
technology B4
The results of Table No. (4) showed that the value of the Spearman correlation coefficient reached
(0.737) between information and communication technology and the improvement of health services in
general, which is represented by (B), and from it it is clear that there is a significant correlation between
information and communication technology and the improvement of health services from the point of
view The research sample. The value of the Spearman correlation coefficient was (0.564) between the
dimension (physical devices) and the improvement of health services (B1), and from it it is clear that
there is a significant correlation between the physical devices and the improvement of health services,
and this means accepting the first sub-hypothesis from the point of view of the research sample. The
value of the Spearman correlation coefficient was (0.731) between the dimension (software) and
improving health services (B2), and from it it is clear that there is a significant correlation between
software and improving health services, and this means accepting the second sub-hypothesis from the
point of view of the research sample. The value of the Spearman correlation coefficient was also
(0.736) between the database dimension (B3) and improving health services, and from it it is clear that
there is a significant correlation between databases and the improving health services, and this means
accepting the third sub-hypothesis from the point of view of the research sample. The table also reflects
(4) The correlation between the dimension of communication networks (B4) and the quality of health
services, where the value of the Spearman correlation coefficient reached (0.694), and from it it is clear
that there is a significant correlation between communication networks and the quality of health
services, and this means accepting the fourth sub-hypothesis from the point of view of the sample.
Research: Table (4) reflects the correlation between the human resource dimension (B5) and the
improving health services, where the value of the Spearman correlation coefficient was (0.794), and
from it it is clear that there is a significant correlation between the human resource and the quality of
62
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
health services, and this means accepting the hypothesis. The fifth subscale from the point of view of
the research sample.
Since all the values of the correlation coefficients were between the two values (0.564 and 0.794),
which means that all the relationships between information and communication technology and the
quality of health services were between medium and strong, as we notice from the results in the table
above that the highest strength of correlation was between the supplier and The human and improving
health services, where the correlation coefficient reached 0.794, while the lowest degree of correlation
was between the physical devices and the quality of health services with a degree of 0.564. This reflects
the close interrelation between the various dimensions of information and communication technology
and the improving health services. Therefore, the institution must focus on the dimensions of
information and communication technology and not focus on One after another.
3.2.2 Analyzing the impact relationship of the research variables from the point of view of the research
sample
Testing the second main hypothesis (there is a statistically significant relationship (effect) between
information and communication technology and the improving health services).
Analysis of the levels of influence of research variables:
A- The impact of information and communication technology on the improving health services in
general
Table (5) Analysis of the impact of information and communication technology on the improving
health services in general from the point of view of the research sample
It is clear from Table (5) that information and communication technology, as an independent variable,
has a significant impact on the improving health services as a dependent variable, as shown by the (F)
test, as its value was (35.328), and the coefficient of determination (R2) had a value of (48). The
regression coefficient (B) had a value of (0.655) and at a significance level of (0.001) less than (0.05).
This means that information and communication technology as an independent variable explains and
interprets (48%) of the changes occurring in the dependent variable, and this means that (52%) ) of the
variables are due to other variables that are not shown in the research model from the point of view of
the research sample, and this means accepting the second main hypothesis, which states: “There is a
significant relationship (effect) between information and communication technology and the improving
health services in the hospital under investigation.”
B- The impact of physical equipment on the improving health services
63
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Table (6) The impact of physical devices on the improving health services from the point of view of the
research sample
It is clear from Table (6) that information and communication technology (physical devices) as an
independent variable has a significant impact on the improving health services as a dependent variable,
as shown by the (F) test, as its value was (23.300), noting that the coefficient of determination (R2) was
Its value was (38) and the regression coefficient (B) had a value of (0.382) and at a significance level of
(0.001) less than (0.05). This means that information and communication technology as an independent
variable explains and explains (38%) of the changes occurring in the dependent variable. This means
(62%) of the variables are due to other variables that are not shown in the research model from the
point of view of the research sample, and this means accepting the first sub-hypothesis, which states:
“There is a significant relationship of influence between physical equipment and the quality of health
services.”
H- The impact of software on the improving health services
Table (7) The impact of software on the improving health services from the point of view of the
research sample
Improving health services
R R2 F B Variables
F Sign B Sign
From the point of view of the research sample
0.711 .50 38.890 0.000 0.478 0.000 Software
It is clear from Table (7) that information and communication technology (software) as an independent
variable has a significant impact on the improving health services as a dependent variable, as shown by
the (F) test, as its value was (38.890), noting that the coefficient of determination (R2) was Its value is
(0.50) and the regression coefficient (B) was valued at (0.478) and at a significance level (0.000) less
than (0.05). This means that information and communication technology as an independent variable
explains and explains (50%) of the changes occurring in the dependent variable. This means that (50%)
of the variables are due to other variables that are not shown in the research model from the point of
view of the research sample. This means accepting the second sub-hypothesis, which states, “There is a
significant relationship of influence between software and the improving health services.”
64
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Table (8) The impact of databases on the improving health services from the point of view of the
research sample
It is clear from Table (8) that information and communication technology (databases) as an independent
variable has a significant impact on improving of health services as a dependent variable, as shown by
the (F) test, as its value was (47.398), noting that the coefficient of determination (R2) was Its value was
(0.55) and the regression coefficient (B) had a value of (0.402) and at a significance level of (0.000) less
than (0.05). This means that information and communication technology as an independent variable
explains and explains (55%) of the changes occurring in the dependent variable. This means (45%) of
the variables are due to other variables that are not shown in the research model from the point of view
of the research sample. This means accepting the third sub-hypothesis, which states: “There is a
significant influence relationship between databases and the improving health services.”
D- The impact of communication networks on the improving health services
Table (9) The impact of communication networks on improving health services from the point of
view of the research sample
It is clear from Table (9) that information and communication technology (communication networks)
as an independent variable has a significant impact on the quality of health services as a dependent
variable, as shown by the (F) test, as its value was (43.576), noting that the coefficient of
determination (R2) was Its value was (0.53) and the regression coefficient (B) had a value of (0.449)
and at a significance level of (0.000) less than (0.05). This means that information and communication
technology as an independent variable explains and explains (53%) of the changes occurring in the
dependent variable. This means (47%) of the variables are due to other variables that are not shown in
the research model from the point of view of the research sample. This means accepting the fourth
sub-hypothesis, which states: “There is a significant relationship of influence between communication
networks and the quality of health services.”
I- The impact of the human resource on the quality of health services
65
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Table (10) The impact of the human resource on the quality of health services from the point of view
of the research sample
It is clear from Table (10) that information and communication technology (human resource) as an
independent variable has a significant impact on the quality of health services as a dependent variable,
as shown by the (F) test, as its value was (49.585), noting that the coefficient of determination (R2) was
Its value was (0.56) and the regression coefficient (B) had a value of (0.529) and at a significance level
of (0.000) less than (0.05). This means that information and communication technology as an
independent variable explains and explains (56%) of the changes occurring in the dependent variable.
This means (44%) of the variables are due to other variables that are not shown in the research model
from the point of view of the research sample. This means accepting the fifth sub-hypothesis, which
states: “There is a significant influence relationship between the human resource and the quality of
health services.”
After analyzing the questionnaire data using the statistical program - SPSS, we found that there is a
statistically significant relationship between information and communication technology as an
independent variable on the one hand and the quality of health services as a dependent variable on the
other hand, as there is a positive autocorrelation between information and communication technology
and the quality of health services, and this is sufficient, To confirm and explain the relationship
between the independent and dependent variables. It was also shown through the study of the one-way
analysis of variance (ANOVA) test that there is a significant significant effect between the variables of
the study, which are mainly represented in information and communication technology and the quality
of health services in the studied community.
Conclusions
1. Through statistical analysis of the research sample in the international hospital and the international
hospital affiliated with the private sector, it appears that there is an awareness of the improving
health service provided in hospitals.
2. The hospital’s interest in working on using appropriate software to analyze, classify, and
summarize data to prepare the information it requires at the present time.
3. The hospital’s interest in using databases, recording all patient information on a daily basis, and
providing the Internet in order to provide information in real time.
4. It has been shown that there is a correlation between information technology and the improving
health services, as information technology has a significant impact on the dimensions of health
quality. This indicates that investment in information and communication technology components
contributes to a high level of the health service provided.
5. Hospitals’ interest in the improving health service and working to reach a high level of quality.
This was clearly evident through the research sample’s answers to questions related to the
improving health service provided.
66
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Recommendations
1. Developing the electronic communication system between the various hospital departments and
thinking about alternative solutions in the event of a breakdown.
2. Developing the capabilities and skills of all employees by having health institutions conduct
training courses and study days on various information technology applications in the hospital .
3. The necessity of coordination between private sector hospitals and foreign hospitals that use
health service quality systems in order to exchange experiences in the field of health service
quality.
4. It is necessary to include laws and regulations that control the use of this technology in order to
maintain the confidentiality and security of information.
5. Activating communication between citizens and health institutions through developing their
websites.
Sources
1. Chubakumzuk Jamir & Moameren Pongen ,” The role of information and communication technologies in improving
teaching and learning processes in higher education: Bridging the gaps”. RESEARCH REVIEW International Journal of
Multidisciplinary 2021; 6(4):37-45 ,2021.
2. Yasser Abd. Djawad & Sutarsi Suhaeb,“ROLE OF INFORMATION TECHNOLOGY IN HEALTH SECTOR TO
IMPROVE HEALTH CARE IN INDONESIA”, INTERNATIONAL CONFERENCE ADRI - 5 ,2017.
3. Abdul Hadi, K., Zidan and Hadi, Manar, Haitham,”The Contribution of Information and Communication Technology in
Crisis Management: An Exploratory Study of the Views of a Sample of Individuals at the Central Bank of Iraq –
Baghdad”, The Journal of AL-dananeer , Vol.1, Issue 13, 407 – 430,2018.
4. Ogungbade, Aderonke CLN & Abdul, oluwatobi Mr,“Information and Communication Technology Applications and use
in Medical Records and Information Management in Selected Hospitals in Ijebu Ode Local Government Area, Ogun
State”, Library Philosophy and Practice (e-journal). 7034,2022.
5. Dr. Qassim N. AL-Mahwey & Hydar R. Sayah , “The Impact of Information and Communication Technology on the
Technical Quality of Health Services "A Study at Al-Shatrah General Hospital – Dhi- Qar, Iraq", Volume 20 Issue 5
Version 1.0 Year 2020.
6. Saleem, Farrukh and Salim,Naomie, “Assessing the effects of information and communication technologies on
organizational development: business values perspectives”, Information Technology for Development , 26: 1, 54-88
,2020.
7. Musleh, Attia, “ The Quality of the Services offered by the Hospitals in the City of Qalqilya from the Perspective of the
Staff and Patients”, Journal of Al-Quds Open University for Humanities and Social Studies, Vol. 2, No. 27, 11- 48,2017.
8. DR MARGARET CHAN ,“The Contribution of Family Medicine to Improving Health Systems”, CRC Press is an imprint
of the Taylor & Francis Group, an informa business,2020.
9. Chimango Nyasulu & Winner D. Chawinga ,” The role of information and communication technologies in the delivery of
health services in rural communities: Experiences from Malawi” , South African Journal of Information Management
,2018.
10. Al Jazari, Safa Mand Muhammad, Ali Ghobash and Shetit, Bushra Abdullah,” Measurement and Assessment of Health
Services Quality Application Study in AL-Faiha General Hospital –Basrah”, Managerial Studies Journal, Vol.4, Issue 7,
1-59,2011.
11. Al-Zubaidi, Ghani, Dahham, Tanai and Al-Shujairy, Faten, Abbas Khalil,” Evaluation of Quality of Health Service in
Primary Health Care Centers / Case Study in Family Medicine Centers in Baghdad”, journal of Economics And
Administrative Sciences, Vol. 24, Issue 106, 23 – 41,2018.
12. Gargvanshi, Prasenjit, and Kumar, Rajesh,” Role of information and communication technology (ICT) in improving
service quality and customer loyalty in telecom industry”, Journal of Information and Computational Science, Vol. 13,
Issue 1, 1- 7,2020.
13. Hammadi, Majed, Ibrahim, and Hamad, Amer, Ali, and Hussein, Wissam, Ali,”Information and communication
technology and its impact on the quality of service of the tourism sector and hotel an analytical study in selected hotels in
the Iraqi capital Baghdad”, Journal of Accounting and Financial Studies, Vol. 13, Issue 45,139 – 152,2018.
67
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
14. . Sittig, Dean, F., and Singh, Hardeep,” A new sociotechnical model for studying health information technology in
complex adaptive healthcare systems”, Qual Saf Health Care, Springer, Cham, 59-80,2015.
15. Yassir, Ali, Hameed and Dakhil, Ali, Fatah ,” Information Technology Services in Thi-Qar Province Analysis Study”,
Univesity of Thi-Qar Journal, Vol. 11, Issue 4, 1-10,2016.
68
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
69
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
1
Ministry of High Education and Scientific Research/Minister’s office, Baghdad, Iraq.
2
University of Information Technology and Communications, Baghdad, Iraq.
3
Al-Esraa University, Baghdad, Iraq.
[email protected]
[email protected]
[email protected]
Briefly:
In this study paper, we will explain how to conceal sensitive notification in a color movie by selecting
a frame at random and then using a mathematical calculation to split the frame into (R G B) and
random pixels from that frame. This method goes through five basic stages, the first stage, transform
the video to frames, which represents the number of frames that make up the video, the second stage
choice one frame from this frames randomly, after that transform the frame to digital and separating the
frame to three matrix (R, G, B), third stage transform secret message the encryption using the RSA.
The number of pixels choose dependent on the length encryption secret message. Fourth stage hiding
the encryption message in the frame randomly in (R, G, B). Then we return the selected pixels to their
original positions in the frame. The five stages, return the frame in original place in video and send the
video to the recipient. The statistical measures were used the Structural Similarity Index Measure
(SSIM), peak signal to noise ratio (PSNR), histogram and mean square error (MSE). The outcomes
achieved are excellent. The recipient to extract the secret message follows the same secure keys to
arrive the hid secret and same steps from the first four stages.
Keywords: Information concealing, Video, SSIM, PSNR, MSE, and Modified RSA cryptography,
Seed number, Histogram.
INTRODUCTION
These days, information security is crucial to the storage and transmission of data, particularly
when high levels of anonymity are needed. The video or images are rentals in considerable part in
many businesses. Because of this, it's important to protect video and image data from prohibitive arrival
or from being decrypted by an unexpected user. Attackers and other intruders interfere with the
majority of systems globally, altering or tampering with critical data that is transmitted through those
systems. The secrecy of digital videos has become more important in today's technological and
connected society. Numerous researchers have come up with numerous strategies to avoid these issues
and stop them from disclosing or altering information in order to tackle these concerns. The most well-
known techniques for preserving crucial data while it is being sent are cryptography and
steganography. An inclusion technique for hiding encrypted messages in random and non-contiguous
pixel locations along borders and in smooth areas of pictures [1]. Steganography is a technique for
concealing information in media, whereas cryptography encrypts data and uses an appropriate key [2, 3,
4 ]. Utilizing a hash function to generate a modality for data hiding into the carrier media's LSB of
RGB pixel values [5]. In the temporal domain, a mixed steganography and encryption technique is
used. First, the secret handwritten signature's image is encrypted using RSA; the final three bits are then
randomly entered based on mathematical randomized [6]. By integrating many cryptography phases—
the DNA algorithm, GZIP algorithm, AES and image, multiplying by worker along the last step of
DNA encryption, and LSB image steganography technology—the encrypted letter is disguised in a
high-quality image steganography [7]. An innovative asymmetric picture encryption method relied on
the Arnold transformation and RSA algorithm. First, the quantum logistic chart's prime values are
70
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
generated using the RSA algorithm's asymmetric public key. Secondly, the Arnold chart's parameters
are computed. The process of investigating the rough concealing of picture information on a typical
image is called the Arnold creeping operation. Third, the image's columns and rows are each assigned
different units, and exclusive-OR (XOR) diffusion is then used [8]. Combining the human skin-color
offer with the LSB algorithm—which can choose the inclusion zones—is an additional choice. This
theory is based on the observation that the Human Vision System (HVS) tends to concentrate its
attention on selecting specific visual sight structures rather than the entire image [9]. Secret data was
concealed in a grayscale digital image using a different technique. Combining RSA encryption with
steganography has advantages. This method relies on looking for two-by-two congruence bits between
the values of the image pixels and the secret data bits. The confidential data bits are hidden at the drag
(LSB) least significant bits in the event that the bits are not congruent. To apply the steganography
technique, two types of images are used: a bright grayscale image and a dark grayscale image [10].
Arnold Mapping is utilized to guarantee extreme jumbleness in both copartner pixels and random
spreading, hence excluding any potential interaction with the main picture placate, architecture
enlarged visual cryptography design for color images and increased security [11]. A mix of three
techniques to increase the system's overall security level: altered RSA cryptography, steganography-
encrypted text, and random pixel selection from an image [12]. Use a mathematical equation to
randomly pick the number of bytes in a color image that contains confidential information. The long of
the confidential message determines how many randomly chosen bytes will be included in the digital
picture once it has been transformed [13]. Combining cryptography and steganography results in a
strong system that can use the RSA technique to encode a secret message. The sophisticated LSB
approach is utilized to disguise the message [14]. This work uses the affine transformation approach as
a display steganography method to hide data. The coefficients of the video frames' integer wavelet
transform include the secret data. The affine transformation is used to disperse the pixel values during
embedding [15]. This article illustrates the two approaches' various applications. A communication is
encrypted while it is being transferred over a network from one source to another using steganography
and cryptography. These methods are frequently employed to ensure the security and privacy of data.
While stenography is used to conceal the cover medium, such as audio, photos, or videos, cryptography
keys conceal information using a private key or public key, preventing third party from accessing the
data. These methods have been applied to entity authentication, basic authentication, confidentiality,
and security of data[16]. Suggested encrypting images with second-order equations and embedding the
resultant encrypted image within the movie. To strengthen the security layer, the image is embedded
based on the equations rather than sequentially. The experimental findings indicate that a high
embedding ability is achieved by the suggested strategy. Additionally, as compared to alternative
information-hiding techniques, the suggested system is more secure and resilient due to encryption and
non-sequential frame and bit-hiding location selection [17]. In order to conceal data in video files, this
project presents the Least Significant Bit Substitution approach using elliptical curve cryptography.
Data hiding, a type of cryptography used in this research, inserts data into digital media for
identification and annotation purposes [18]. This study looks at the histogram that forms inside the
frame as well as the forecast error that arises between two consecutive frames of a video binder. The
resulting stego_file's frame count and composition remain unchanged despite these updated forecast
inaccuracies [19]. Video frames can be encrypted and conceal into a cover video binder using one of
two techniques. First, a wide variety of distinct keys were generated for encryption using two keys and
the XOR bit operation. Second, to provide two security levels, a improve version of the least significant
bit (LSB) technique was used to hide bitmap color, high quality video frames in specific cover video
frames. Encryption and data masking techniques were successfully tested on numerous classified
recordings, including Traffic, Secret Medicine, and Ad Eye videos [20].
This study offers a novel approach to stop hackers, intruders, and cryptanalysis from accessing,
changing, or tampering with sensitive data. Using five methods, video splitting, RSA modification,
unspecified of the chosen frame from color video, selection of pixels from a single frame based on the
length of the secret message, and concealment technique employing (LSB).
71
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
FUNDAMENTALS
RSA Cryptography
One of the earliest and most commonly employed methods for public-key encryption is the RSA
algorithm. This cryptographic technique was introduced in 1977 by a team of MIT-affiliated
researchers led by Ron Rivest, Adi Shamir, and Leonard Adelman. RSA is frequently utilized for
creating public and private key pairs [21]. The RSA algorithm operates in an asymmetric manner,
involving the use of two keys: one for the public and another for the private. Next, it proceeds with the
key generation procedure in five steps:
LSB Concealing
The purpose of concealing is to hide sensitive information within the transmission medium so that
an adversary cannot detect the presence of the hidden message. Steganography can be used with
various forms of data such as audio, video, and images, and has the ability to hide a wide range of
digital content. The least significant bit, or LSB, is one of the most straightforward techniques for
cancelation of spatial domain images [8]. The following algorithm makes hiding easier and easier to
implement. The goal of data embedding is to obliquely add a message to each pixel's least significant
bit on the bearer medium. View the following example:
Bitmap picture file: 10101101 11001010 10111010 01011001
Piece of Information: 0010
Stego Picture: 10101100 11001010 10111011 01011000
Later, other researchers proposed and put into practice some expanded versions of this technique.
According to a study [25], bit replacement can also be performed on the sixth, seventh, eighth, and
even on their combination.
Dedication Measure
The degree of change between the original image and the stego-image is estimated using these kinds of
measurements. The following are the most well-known measurements [26]:
Equation of (MSE)
It is the average of two photos' square errors:
72
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
(2)
Equation of (PSNR)
The PSNR values, which assess the ratio of distortion and are derived from equation (3) for color
images, are used to compare the original and stego-image:
(3)
(4)
Where (x, y) = 0, and (x, y) = 255 denoted the original and embedded images,
respectively, and .
Equation of (SSIM)
Together with MSE and PSNR, a more recent metric like the structural similarity index metric (SSIM)
can provide a comparison. Greater similarity is indicated by a high SSIM around one. SSIM can be
computed using:
(5)
The constants and > 0 are employed to ensure stability when other parameters are approximated to
zeros, where σ is the standard deviation and μ is the mean intensity.
The suggested system introduces a enhanced to the RSA formula, involving multiplication of the
typical RSA formula by an integer for encryption and division by the same integer for decryption. This
integer incorporates any additional keys included in both the private and public keys. This adjustment
results in a modified RSA equation for encryption, with 'E' representing the cipher text. Now, the
equation of RSA becomes:
E= (6)
Where the integer, I is positive. Equation (7) represents the decryption equation.
(7)
73
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Encryption Decryption
Start Start
Frame Selected
Frame Selected
R G B
R G B
(m,n,k,1)
Secret Message
Stego _Video
End Decryption
End Encryption
PROPOSED METHOD
The suggested approach can FIGURE 1. The with
be used encryption
colorandvideo
decryption
andflowchart
is described through two algorithms: one
for encryption and one for decryption. When this algorithm is employed on a color video, it involves
the following steps: splitting the video into individual frames, randomly selecting one or more frames,
74
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
separating the chosen frame(s), performing encryption, embedding secure data, and finally, decrypting
and extracting the secure data. Algorithms 1 and 2 elaborate on each of these phases.
Algorithm 1 (transmitter portion)
Input: video cover, message, seed number, p, q, and integer I.
Output: stego_video.
A. Utilize the cover video
B. Divide the video into individual frames.
C. Randomly choose a frame using equation (1).
D. - Convert the message into ASCII format.
E. Employ equation (6) for message encryption.
F. Calculate the length of the ciphertext.
G. Split the selected frame into a 1-dimension (m * n * 3, 1), giving every pixel an index.
H. Using the equation (1) with a seed number to obtain a unspecific pixel from step (F) based on the
long of the ciphertext.
I. Utilize LSB cancellation to hide the information in the randomly chosen pixel from (G).
J. Restore each pixel to its original position based on the frame's index.
K. Convert the one-dimensional representation of the selected frame back into a three-dimensional
format (n, m, 3) to reconstruct the original frame.
L. Return the chosen frame to its original location in the video.
M. Transmit the video to the recipient as "Stego_video."
Algorithm 2 (recipient portion)
Input: video cover, message, seed number, p, q, and integer I.
Output: confidential message.
A. The Stego_video.
B. Divide the Stego_video into individual frames.
C. Randomly choose a frame using equation (1).
D. Transform the selected frame into a one-dimensional format (m * n * 3, 1).
E. Utilize equation (1) and input the message length together with the transmitter seed number.
F. Utilize LSB to extract the secure data from the pixels selected in step (E).
G. The ASCII form of the message can be obtained by applying equation (7) with the same values for I,
p, and q.
H. Transform the ASCII characters into the original message.
I. The concealed confidential message.
TRIALS AND OUTCOMES
The suggested solution was put into practice on an HP PC running Windows 7 with an Intel(R) Core
(TM) I5-7200U processor, 2.5 GHz CPU, 4.00 GB of RAM, and MATLAB 2014a software. The
program was used on video file type (VIA), and the frame BMP type as cover video. The split of video
shown that in Figure (2). The Figure (3A, 3B) depicts the façade of the proposed system apparenting
the methods of encryption and decryption. The outcomes demonstrate that the suggested algorithm
accomplishes a significant security. The findings demonstrate that the recommended method satisfies a
significant security note, as indicated by figures 4 through 9 and the fidelity measure values listed in
Table 1. The frame from figure (4), shown as a random numbers selection made from the frame
following the message's encryption, and figure (5) represented of the frame 25 represent original and
stego-frame and histogram (R, G, B) to the random frame selected, and frames from figures (6, 7, 8, 9)
represented the frames (56,126,187,377) with the original frame and stego-frame and histogram
caparison between original and stego-frame. The histogram of the original frame with the same length
message is compressed when different frames are taken; the viewer is not aware of the subtle change in
the histogram's form. A sample of choose random number from color frame of size 400 × 300 of
message” hello hatem how are you i hope you are good health”, Figure (4) displays the results for 88
generation of pixels.
75
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
The suggested approach can be used with color video and is described through two algorithms: one for
encryption and one for decryption. When this algorithm is employed on a color video, it involves the
following steps: splitting the video into individual frames, randomly selecting one or more frames,
separating the chosen frame(s), performing encryption, embedding secure data, and finally, decrypting
and extracting the secure data. Algorithms 1 and 2 elaborate on each of these phases.
Algorithm 1 (transmitter portion)
Input: video cover, message, seed number, p, q, and integer I.
Output: stego_video.
A- Utilize the cover video
B- Divide the video into individual frames.
C- Randomly choose a frame using equation (1).
D- - Convert the message into ASCII format.
E- Employ equation (6) for message encryption.
F- Calculate the length of the ciphertext.
G- Split the selected frame into a 1-dimension (m * n * 3, 1), giving every pixel an index.
H- Using the equation (1) with a seed number to obtain a unspecific pixel from step (F) based on
the long of the ciphertext.
I- Utilize LSB cancellation to hide the information in the randomly chosen pixel from (G).
J- Restore each pixel to its original position based on the frame's index.
K- Convert the one-dimensional representation of the selected frame back into a three-dimensional
format (n, m, 3) to reconstruct the original frame.
L- Return the chosen frame to its original location in the video.
M- Transmit the video to the recipient as "Stego_video."
Algorithm 2 (recipient portion)
Input: video cover, message, seed number, p, q, and integer I.
Output: confidential message.
A- The Stego_video.
B- Divide the Stego_video into individual frames.
C- Randomly choose a frame using equation (1).
D- Transform the selected frame into a one-dimensional format (m * n * 3, 1).
E- Utilize equation (1) and input the message length together with the transmitter seed number.
F- Utilize LSB to extract the secure data from the pixels selected in step (E).
G- The ASCII form of the message can be obtained by applying equation (7) with the same values
for I, p, and q.
H- Transform the ASCII characters into the original message.
I- The concealed confidential message.
The suggested solution was put into practice on an HP PC running Windows 7 with an Intel(R)
Core (TM) I5-7200U processor, 2.5 GHz CPU, 4.00 GB of RAM, and MATLAB 2014a software. The
program was used on video file type (VIA), and the frame BMP type as cover video. The split of video
76
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
shown that in Figure (2). The Figure (3A, 3B) depicts the façade of the proposed system apparenting
the methods of encryption and decryption. The outcomes demonstrate that the suggested algorithm
accomplishes a significant security. The findings demonstrate that the recommended method satisfies a
significant security note, as indicated by figures 4 through 9 and the fidelity measure values listed in
Table 1. The frame from figure (4), shown as a random numbers selection made from the frame
following the message's encryption, and figure (5) represented of the frame 25 represent original and
stego-frame and histogram (R, G, B) to the random frame selected, and frames from figures (6, 7, 8, 9)
represented the frames (56,126,187,377) with the original frame and stego-frame and histogram
caparison between original and stego-frame. The histogram of the original frame with the same length
message is compressed when different frames are taken; the viewer is not aware of the subtle change in
the histogram's form. A sample of choose random number from color frame of size 400 × 300 of
message” hello hatem how are you i hope you are good health”, Figure (4) displays the results for 88
generation of pixels.
77
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
FIGURE 4. After the message has been encrypted, a random number is chosen from the frame.
FIGURE 7. Frame 126 represent original and stego and histogram (R, G, B)
FIGURE 8. Frame 187 represent original and stego and histogram (R, G, B)
FIGURE 9. Frame 377 represent original and stego and histogram (R, G, B)
79
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
TABLE 1. Represent the variation value statistical measure for different frames
IN CONCLUSION
Observes that by using video frames with strong color intensity and frame-to-frame differentiation, the
following findings are made:
A- The (SSIM)is very near to 1, the MSE is very tiny, and the PSNR values are very high.
B- The original and stego-frame histograms are nearly the same.
C- A unique approach that can stop any attackers or intruders was created by combining randomized
pixel selection from the frame with LSB steganography and altering RSA.
D- By using cryptography to tweak the RSA method and provide an alternative, an attacker or intruder
will find it extremely difficult to predict the factor that adds to the RSA algorithm—particularly
when adding a new element.
E- In order to avoid repeating the amount of pixels, it is preferable to select appropriate values for the
seed number, p, q, and I.
F- The suggested system receives the algorithm, which is safe to hide any sensitive information and
ensures that the video is not altered—even in the event that hackers or attackers try to access it.
H- The suggested system functions efficiently, rapidly, and well.
I- Using video in the process of hiding information gives you more space and flexibility, in addition to
the possibility of revealing confidential information easily.
References
1. M. Juneja and P. S. Sandhu, “An improved LSB based steganography technique for RGB color images”, Int. J.
Comput. Commun. Engin. 2(4) (2013) , pp:513–517.
2. K. Kordov and S. Zhelezov, “Steganography in color images with random order of pixel selection and encrypted
text message embedding”, Peer J. Comput. Sci. 7 (2021) e380.
3. S. Majumder and M. M. Rahman, “Implementation of security enhanced image steganography with the
incorproation of modified RSA algorithm”, Int. Conf. Elect. Comput. Commun. Engin. (2019) ,pp:1–5.
4. M. E. Saleh, A. A. Aly and F. A. Omara, “Data security using cryptography and steganography techniques”, Int. J.
Adv. Comput. Sci. Appl. 7(6) (2016) ,pp:390–397.
80
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
5. R. Halder, S. Sengupta, S. Ghosh and D. Kundu, “A secure image steganography based on RSA algorithm and
hash-LSB technique”, IOSR J. of Comput. Engin. 18(1) (2016), pp: 39–43.
6. Y. M. Wazery, S.G. Haridy and A.A. Ali,” A hybrid technique based on RSA and data hiding for securing
handwritten signature”, Int. J. Adv. Comput. Sci. Appl. 12(4) (2021).
7. Q. S. Alsaffar, H. N. Mohaisen and F. N. Almashhdini, “An encryption based on DNA and AES algorithms for
hiding a compressed text in colored Image”, IOP Conf. Series Materials Sci. Engin. 1058(1) (2021) 012048.
8. G. Ye, H. Wu, K. Jiao and D. Mei, “Asymmetric image encryption scheme based on the Quantum logistic map and
cyclic modulo diffusion”, Math. Biosci. Engin. 18(5) (2021), pp:5427–5448.
9. S.A. Naji, H.N. Mohaisen, Q.S. Alsaffar and H.A. Jalab,” Automatic region selection method to enhance
imagebased steganography”, Period. Engin. Natural Sci. 8(1) (2020), pp:67–78.
10. S. O. Alsharkasi, M. M. Elsheh and F. O. Ehtiba, “Evaluation of using steganography technique to hide a text in
grayscale digital images”, J. Acad. Res. Appl. Sci. 19 (2021), pp: 1–6.
11. M. O. Alsadeg Ali,” Visual cryptography scheme for color images using Arnold mapping and modified RSA
algorithm”, M.Sc. Thesis, Sudan University of Science and Technology, 2018.
12. Hatem Nahi Mohaisen, Awad Kadhim Hammoud, “Application of modify RSA cryptography and randomly LSB
steganography on color images of fluid flow in a channel”, Int. J. Nonlinear Anal. Appl. 12 (2021) No. 2, 1725-
1734,http://dx.doi.org/10.22075/ijnaa.2021.5312.
13. Awad Kadhim Hammoud, Hatem Nahi Mohaisen, Mohammed Q. Mohammed, “Secret information hiding in
image randomly method using steganography and cryptography”, Int. J. Nonlinear Anal. Appl. Volume 12, Special
Issue, Winter and Spring 2021, 1283-1291 http://dx.doi.org/10.22075/ijnaa.2021.5644.
14. John K. Alhassan, Idris Ismaila, Victor O. Waziri, and Adamu Abdulkadir, “A Secure Method to Hide Confidential
Data Using Cryptography and Steganography”, International Conference on Information and Communication
Technology and Its Applications (ICTA 2016).
15. Mritha Ramalingam, Nor Ashidi Mat Isa, R.Puviarasi, “A secured data hiding using affine transformation in video
steganography”, Procedia Computer Science 171 (2020), pp: 1147–1156.
16. Priya Mathur and Amit Kumar Gupta, “A Study of Data Hiding UsingCryptography and Steganography ”, ©
Springer Nature Singapore Pte Ltd. 2020 D. Goyal et al. (eds.), Information Management and Machine
Intelligence,Algorithms for Intelligent Systems, https://doi.org/10.1007/978-981-15-4936-6_1
17. Hawra’a Razzak Radhi and Majid Jabbar Jawad, “Combining A Cryptography and Steganography Techniques –
Based Securing Transmitted Video Through Unsecure Channel”, Journal of University of Babylon for Pure and
Applied Sciences, Vol. (28), No. (3): 2020.
18. Madhan.S, Manimekala.M, Punithavallai.K andSuganya.V, “Efficient Data Hiding in Encrypted Video Using
Cryptography”, IJCRT Vol.(6), Issue 1 ( 2018).
19. Tohari Ahmad and Alek Nur Fatman,” Improving the performance of histogram-based data hiding method in the
video environment”, Journal of King Saud University – Computer and Information Sciences 34 (2022), pp: 1362–
1372.
20. Faten H. Mohammed,” Robust video data security using hybrid cryptography-steganography technique”,
Periodicals of Engineering and Natural Sciences Vol. 8, No. 3,( 2020), pp.1741-1751.
21. S. Manaseer, A. Aljawawdeh and D. Alsoudi,” A new image steganography depending on reference and LSB”, Int.
J. Appl. Engin. Res. 12(9) (2017), pp: 1950–1955.
22. S. Asjad, “RSA Algorithm”, University of South-Eastern Norway Campus Kongsberg, (2019).
23. F. Koeune, “Pseudo-Random Number Generator”, In: H. C. A. van Tilborg (eds) Encyclopedia of Cryptography
and Security Springer, Boston, MA, 2005.
24. D. Lehmer, “Mathematical methods in large-scale computing units”, In: U. S. N. D. B. o. Ordnance and H.
University (eds) Proceedings of the second symposium on large-scale digital computing machinery, Harvard
University, 1951, pp:141–146.
25. K. A. Al-Afandy, O. S. Faragallah, A. Elmhalawy, E. S. M. El- Rabaie and G. M. El-Banby,” High security data
hiding using image cropping and LSB least significant bit steganography”, Colloq. Inf. Sci. Tech. (2017), pp:400–
404.
26. H.N. Mohaisen, “Secure data hiding technique using steganography and watermarking”, M.SC. Thesis, College of
Science, Baghdad University, 2016.
81
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
82
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
1. Introduction
Numerous applications have utilized the relationship between topology and graph to generate many
new types of a topology generated by graph, because of the importance of topological graph theory as It
is part of graph theory that has a great role and illustrious history in mathematics. The sources [1-4]
include several great introductions to graph theory, topological graph theory, and a few applications.
On the basis of vertices or edges, some topological models are developed or based. In the undirected
graphs and directed graphs. In 2013, Jafarian et al. began using a graphic topology for any locally finite
without isolated vertices [5]. 2018 [6] saw kilicman and Abdulkalek define a sub-basis family as a set
of vertices associated with an Incidence Topology for any simple graph without an isolated vertex sets
containing the edge of each incident vertex. A revised definition of the term “Family of sub-basis”
was introduced in 2020. This definition created independent Topology of any un-digraph via vertices
that are not adjacent to the Zainab and Asmhan introduce vertex ⱴ [7]. Asmhan and Zainab in 2022,
give the topology of independent compatible edges [8], which is describted as the topology connected
to the group of edges. Asmhan and Iman authored an Independent in 2022. Digraph-based incompatible
Edges topology with specific applications [9], the reader can also see [10,11]. In 2023, non-incidence
topology was founded by Asmhan and Jafar, in [12]
Accordingly, in our new paper, we define a new kind of topological spaces associated with simple
undirected graph Ɠ, which we named it non-adjacency - - topological space. In basic kinds of graphs,
we will investigate some of the advantages that are achieved with the non-adjacent -path of length two-
topology of the undirected graph.
section 2: involve fundamental definitions of graphs and topologies. Definition of a -topological
spaces associated with simple undirected graph Ɠ, in the section 3: We will discuss some preliminary
83
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
result in the fourth section of this paper. In the fourth section of our paper: several main conclusions of
-topology are introduced.
2. Preliminaries
Basic definitions and introductions to topology and graph theory are covered in the part. Ideas are all
often utilized and can be found in books like [1,13,14].
Typically, a graph consists of two sets, , where Ɣ is set of vertices and Ȩ is set of edges, an
edge of the form is loop. Parallel edges are those with the identical end vertices. If a graph
contains no parallel edges or loop, it is considered simple. If the vertex and are connected by edge
then they are adjacent. All of these ideas are well-known and are available in books mentioned above.
We use the symbols for the complete graph with vertices and is cycle graph on vertices and
is path on n edges and is a whole bipartite graph of size partite
An open family of subsets to the non-empty set Ӿ is said to be a topology if the following conditions
are hold: , and
, then (X,Ʈ) is called a topology on space, an
open set is sub set of Ӿ. Indiscrete topology is defined as Ʈ={Ø,X } on while discrete topology is
def. Ʈ= (X) on .
Now, the introducing of non-adjacency - - topological spaces ( -Topological Space), which
associated with undirected graph Ɠ.
3. -Topological Space
This section consists of the definition of a non-adjacency - -topological space ( -Topological
Space) associated with simple undirected graph and some examples on basic undirected graphs.
3.1. Definition: Let be any undirected graph. The -topological space, briefly the
topology named as , which is a topology relates to the vertices set of vertices for , and
brought on by sub-basis whose components are the sets , s. t. if and
is non-adjacent with , then , i.e, if is non-adjacent with and form with a two-
length path.
3.2. Example: Let a graph be as in figure (1) below s. t. ,
, by the definition (3.1) of the - topology above, we can find our new
topology via the following;
Fig. 3.1.
84
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
3.3 Remark: Let be a topological space on the vertices set of the un-directed graph s.t.
, then is not discrete topology, but if then is discrete, notice the following
e.g.
3.4 Example: Consider be the cycle shown in the fig. (2), then:
, ,
Fig. 3.2.
has a sub-basis
. By using finite intersection, the following base is produced
3.5. Example: Consider be the cycle as shown in the fig. (3), then:
, ,
Fig. 3.3
85
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
has a sub-basis
. Then using finite intersection, the following
base is produced
Then, utilizing each unions, will generate a topology as the following:
3.6. Remark: For every undirected path , the topology isn’t discrete topology as in e.g.3.2.
3.7. Remark: For each undirected tree, we satisfy that is discrete topology, notice the following
e.g. 3.8.
3.8. Example: Consider be the undirected tree as shown in the fig.(4), then:
, ,
Fig. 3.4.
86
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
3.9. Remark: be a -topology space with a set of vertices Ɣ of a complete undirected graph
is discrete topology for each , Notice the following e.g.
Fig. 3.5
has a sub-basis . Then via using finite intersection, the following base
is produced . Then, utilizing each unions generate a topology as the
following: , clearly a discrete topology.
3.11 Example: Consider be complete un-directed graph , as shown in the fig. (6) s.t.
, , then;
Fig. 3.6
87
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
has a sub-basis .
Then via using finite intersection, the following base is produced .
Then, utilizing each unions will generate a topology as the following:
Fig. 3.7
has a sub-basis
. Then via using finite intersection, the
following base is produced
4. Preliminary Results:
We show in this section some main properties and results of a new type of topology -topology, in
addition we show that a -topological space is an Alexandroff space.
88
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
4.1. Remark: Let be un-directed graph, for any , a set containing all non-adjacent
vertices in construct with a path of length two is represented by .
Proof: Let | | . Then (by using remark 4.1) there are two vertices such that each
of them is non-adjacent and construct with a two-length path. Hence there exist two open set
, (by using the definition of ), this signifies is a part of the basis of .
Same way if | | .
4.4. Definition [15]: Alexandroff spaces are topological space that contain any arbitrary or random
intersection of open sets.
89
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Proof: Because is the smallest set of all open sets with intersections that contain (using def.
of and is a sub-basis of , then
s. t. -------------(1).
Then, , , so , .
Hence ----------(2)
1. If | | Or , then
Because if | | , then s.t. ,
Now, if then, there exists open set s.t. . Since of the family is the
only open set in which contains ⱴ , so ( by prop. 4.7)
Hence .
4.13. Remark [15]: Every Alexandroff topological space ( be the Ʈ1- space if and only if
. Consequently, because is discrete, the topological space is Ʈ1- space
it is discrete. Now, if is a space of Alexandroff, then it is Ʈ0-space if and only if =
implies , i.e. , distinct vertices . Also, a non-
adjacency (path of length tow) topological space is Ʈ0-space if and only if or
, s. t. (by using corollary 4.9) .
7. References
[1] J. L. Gross and J. Yellen (2003) Handbook of Graph Theory, Discrete Mathematics and its Applications (CRC Press:
vol. 25).
[2] J. R. Stallings (1983) Topology of finite graphs (Invent. math. Vol. 15) pp 550-565.
[3] B. M. R. Stadler and P. F. Stadler, Generalized topological spaces in evolutionary theory and combinatorial chemistry
(Journal of computer Sciences) pp 578-586, 2002.
91
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
[4] M. Shokry and R. E. Aly, Topological Properties on Graph VS Medical Application in Human Heart (International
Journal of Applied Mathematics, Vol. (15) pp 1104-1109, 2013.
[5] S. M. Amiri, A. Jafar zadeh, H. khatibzadeh An Alexandroff topology on graphs (Bulletin of the Iramian Mathematical
Society) Vol.39 (4) pp 646-663, 2013.
[6] A. Kilicman, K. Abdulkalek, Topological spaces associated with simple graphs (Journal of mathematical Analysis, Vol.9
(4), pp 44-52, 2018.
[7] Asmhan Flieh Hassan and Zainab Irhayyim Abed, Independent (Non-Adjacent Vertices) Topological Space Associcated
with Undiected Graphs, With Some Applications in Biomathematices (Journal of Physics: Conference Series 1591)
2020.
[8] Asmhan F. Hassan & Zainab R. Zainy, The independent compatible edges topology of directed graphs, Journal of
Discrete Mathematical Sciences and Cryptography, 25(8), 2683-2695, 2022.
[9] I. A. Ali and A. F. Hassan, The Independent Incompatible Edges Topology on Di-graphs, Journal of Physics: Conference
Series, Volume 2322, 3rd International Conference on Mathematics and Applied Science (ICMAS 2022), Iraq.
[10] Baid, A.O., Al’Dzhabri, K.S., Topological structures using blended vertices systems in graph theory, Journal of
Interdisciplinary Mathematics, 25(6), pp. 1893–1908, 2022.
[11] Al’Dzhabri, K.S., Enumeration of connected components of acyclic digraph, Journal of Discrete Mathematical
Sciences and Cryptography, 24(7), pp. 2047–2058, 2021.
[12] Asmhan F. Hassan and A. M. Jafar, Some results and properties of non-incidence
topological spaces in simple graphs, AIP Conference Proceedings 2414, 040096 (2023).
[13] C. Vasudev, Graph Theory with Applications, New Age International Publishers, New Delhi, 2006.
[14] J. Gross and T. Tucker, Topological graph theory, Wiley-Inter science Series in discrete Mathematics and
Optimization, Wiley & Sons, New York (1987).
[15] T. Speer, A short study of Alexandroff space, Department of Mathematics, New York University, July 2007.
92
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Wael Mahmood Abbas 1st Ghufran A. Ghadhban 2nd and Hind A. majeed 3nd
1
E-mail: [email protected]
2
E-mail: [email protected]
3
E-mail: [email protected]
93
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Wael Mahmood Abbas 1st Ghufran A. Ghadhban 2nd and Hind A. majeed 3nd
1
E-mail: [email protected]
2
E-mail: [email protected]
3
E-mail: [email protected]
Abstract
In this paper, we will study the method of attacking RSA on gaussian integer Since d is
the inverse of e mod (N), we can figure out d if we know and the public key (the
modulus n and the encryption exponent e) We can use the Extended Euclidean algorithm
Knowing now is comparable to knowing P and Q, the two prime factors of N,
mathematically speaking using continued fraction, The Wiener attack against the RSA
cryptosystem with a small secret exponent is an application of this finding. Then, we
show that regardless of the choice of N, there exists an attack based on continued
fractions that recovers the secret exponent.
Introduction
A new method of attacking RSA, known as the modified Wiener's attack, has been
proposed. This method operates in the domain of integers and converts the problem to
the domain of Gaussian integers. By finding the appropriate starting asymptote, a new
continuous fraction is used for estimating the trace from encoding and decoding
messages.
If the secret exponent (d) contains at most one-fourth as many bits as the modulus (N), it
is possible to crack a typical RSA cryptosystem efficiently. In this scenario, P and Q are
Gaussian integers of the same size, and the public exponent (e) is less than N.
94
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
The basic relationship between exponents is used as the starting point for the Wiener's
attack. If N(P) < N(Q) < 2N(P), e < N, and d is the denominator of a convergent from
the continued fraction expansion of e/N, then there exists an integer k such that e*d -
k*φ(N) = 1.
Approximately, φ(N) is equal to N, which implies that (k/d) is approximately equal to
e/N. More precisely, we have the inequality 𝒩 - 3√N < φ(N) < 𝒩.1. Continued fraction:
Example 1:z Let us find the continued fraction expansion for = [ , , ,2]
=
=2+
2.convegent:
In some sense, the convergent are the best possible approximations for a given
nonnegative real:
Definition 1. We call [q0, ..., qm] (for 0 ≤ m ≤ n) the mth convergent to [q0, ..., qn]. In our
example, the convergent are
A0 =
A1 = =
A2 = = …….
Ak= = , for k ≥ 2
95
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
mod 𝒩, respectively.
In 1990, Weiner described a polynomial algorithm for breaking a typical RSA cipher
system where P and Q have the same size and e < 𝒩, if the secret exponent d has at most
one-fourth as many bits as the modulus N.
To improve RSA decryption speed, one might consider using a small secret exponent d.
This choice is particularly advantageous in scenarios like communication between a
smart card and a larger computer. In this case, it is desirable for the smart card to have a
small secret exponent, while the larger computer has a small general exponent to
minimize processing requirements on the smart card.
Example 2: Let p = 379, q =239 using Wiener’s attack on RSA with Integer Continued
fraction expansion of
Solution:
N = PQ → N = 379×239
N = 90581
(N) = (P – 1) (Q – 1) → Ø (N) = 89964
continued fraction:
= = [0,5, 29,4,1,3,2,4,3].
= 0, , , , , , , , ,d=5
5.Gaussian Integer G
Definition 2.
A gaussian integer is a complex number of the form A + Bi where both A and B are
integers. We often denote the set of Gaussian integers by G
Definition 3. NORM
The norm of a Gaussian integers , denote N ( or N ( ) is a real
number defined by N ( )=( )( ) = A2+ B2
97
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Key Generation
1- Select P, Q where P & Q both prime, P ≠Qin Z , prime (4K + 3)
2- Calculate N = N (P) N(Q)
3- Calculate (N) = (N(P)-1) (N(Q)-1)
4- Select integer e such that gcd(Ø(N), e) =1; 1< e < Ø(N)
5- Calculate d = e-1mod Ø(N)
6- public key: PU=
7- private key PR =
Encryption: C = Me mod N, Decryption: M = Cd mod N
1.Table
A B C D E F G H I J K L M N O P
integer 1 2 3 4 5 6 7 8 9 10 11 12 13 1 1 1
4 5 6
Q R S T U V W X Y Z
17 18 19 20 21 22 23 24 25 26
6. Proposed method:
In this section, we propose a new type of Wiener paired RSA attack modification that
operates in the domain of integers. Since it is converted to a gaussian integer after
finding the appropriate starting asymptote, this new continuous fraction is also used for
trace estimates from encoding and decoding massages.
98
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Example 3. Perform Encryption and Decryption using Wiener’s attack on RSA with
Gaussian Integer p = 3, q =3+2i massage: KWATT
Solution:
N(P) < N(Q) < 2 N(P)
N = N(P)N(Q) → N = N(3)N(3+2i)
N = 9×13=117
Ø(N)= (N(P) – 1 N(Q) – 1) → Ø(N)ϕ(N) = 96
1< e < N → gcd(e , Ø(N)) =1→ e =55
de=1mod Ø(N)→ d = 55-1mod 96 = 7
continued fraction:
= = [0,2, 7,1,6].
Convergent: A0 = = 0, A1 = = =
A2 = = =
A3 = , A4=
= [0, , , , ] ].→ =
Massage: KWATT
Encryption: C = Me mod N
C1=1155mod117 =2
C2 = 2355mod 117 = 23
C3= 155mod 117 = 1
C4= 2055mod117 = 110
C5= 2055mod117 = 110
Decryption: M= C d mod N
M1=27 mod 117 =11
M2 = 237mod117 = 23
99
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Example 4. Perform Encryption and Decryption using Wiener’s attack on RSA with
Gaussian Integer p = 1+i, q =1+4i massage: STEVEN
Solution:
N = N(P)N(Q) → N = N(1+i) N(1+4i)
N = 34
Ø(N)= (N(P) – 1 N(Q) – 1) → Ø(N)= 16
1< e < N → gcd (e, Ø(N)) =1→ e =13
de=1mod Ø(N)→ d = 13-1mod 16 = 5
continued fraction:
= = [0,2, 1,1,1,1,2].
Convergent:
A0 = =0
A1 = = =
A2 = = =
= [0,2, , , , , ].→ =
Massage: STEVEN
Encryption: C = Me mod N
C1=1913mod 34=15
C2 = 2013mod 34 = 12
C3= (1+ i)13mod 34 = (1+6 i)
100
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
C4= 2213mod34 = 20
C5= (1+ i)13mod 34 = (1+6 i)
Decryption: M= C d mod N
M1=155 mod 34 =19
M2 = 125mod 34 = 20
M3= (1+6 i)5mod 34 =(1+ i)
M4= 205mod34 = 22
M5= ( 1+6 i)5mod 34 =(1+ i)
Example 5. Perform Encryption and Decryption using Wiener’s attack on RSA with
Gaussian Integer P= 1+2i , Q= 2+3i massage: BIRD
Solution:
N = N(P)N(Q) → N = N(1+2i)N(2+3i)
N = 5×13 = 65
Ø(N)= (N(P) – 1 N(Q) – 1) → Ø(N)= 48
1< e < N → gcd(e , ϕ(N)) =1→ e =7
de=1mod Ø(N)→ d = 7-1mod 48 =7
continued fraction:
= = [0,9, 3,2].
Convergent:
A0 = =0
A1 = = =
A2 = = =
A3 =
= [0,9, , ]. → =
101
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Massage: BIRD
Encryption: C = Me mod N
C1=(1 + i)7 mod 65 = 8 – 8i
C2 = (3i) 7mod65 = 42i
C3= (3+3i)7 mod65 =11-11i
C4= (2i) 7mod65 = 2i
Decryption: M= C d mod N
M1= (8 – 8i)7 mod 65 = 1 + i
M2 = (42i) 7mod72 = 3i
M3= (11-11i)7 mod 65 =3+3i
M4= (2i)7mod65 = 2i
Conclusion
Through the results above within attack RSA defined on the Gaussian integer in a way
continued fraction by modifying Wiener’s attack The modified method has proven
effective in attacking the algorithm's encryption system RSA on gaussian integer
References
1. William Stallings, Cryptography and Network Security, 1999.
2. KHINCHIN, A. Ya.: Continued Fractions, Dover, New York, 1997
3. J¨orn Steuding. Diophantine Analysis. Chapman and Hall/CRC. 2005.
4. LANG, S.: Introduction to Diophantine Approximations, Addison-Wesley, Reading, 1966.
5. Rana Bassam Badawi, On Continued Fractions and its Applications An-Najah National
University, Nablus, Palestine. 2016
6. HINEK, M. J.: Low Public Exponent Partial Key and Low Private Exponent Attack's on Multi-
prime RSA, Master’s thesis, University of Waterloo, 2002.
102
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
103
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Abstract
This study explores the possibility of modifying the rheological properties of chlorinated asphalt by
introducing pyrolyzed polystyrene. Pyrolyzed polystyrene was introduced into the asphalt mixture,
resulting in three distinct samples, each containing varying proportions of pyrolyzed polystyrene
blended with chlorinated asphalt. Subsequent laboratory tests, conducted included evaluations of
ductility, penetration, and softening point. The results indicated significant changes in asphalt
properties due to the introduction of pyrolyzed polystyrene. Additionally, the chlorination process also
was affected on the thermal properties of the original asphalt.
This study has obtained asphaltic samples with rheological properties suitable for various asphalt
application, including paving, platinating and mastic accordance to the standard specifications.
Keywords: Asphalt, Rheological properties, Modify, Chlorination of asphalt, Processing with polystyrene.
Introduction
Asphalt is a highly viscous liquid material whose viscosity increases with temperature. It is a
complex mixture of various hydrocarbon materials with different molecular weights, typically ranging
from 400 to 500 [1,2]. Asphalt's constituents are bound together through physical and chemical forces,
providing a homogeneous appearance and making it seem like a single substance.
Asphalt possesses stable rheological properties crucial for engineering and construction applications,
widely used in road construction, airport runways, bridge building, and more [3,4]. However, to
develop asphalt with distinctive properties suitable for applications beyond traditional asphalt,
numerous researchers have undertaken experiments [5].
Mosckopedis and Speight [6] conducted research involving the addition of chlorine to asphalt, using
iron chloride as a chlorination aid. The goal was to obtain halogenated derivatives of asphalt with dark
color and resistance to solubility in various solvents such as benzene, nitrobenzene, and carbon
tetrachloride.
Makarckiuk and Antonistn [7] studied the impact of heat on chlorinated asphalt derivatives. The
results indicated that high temperatures facilitate HCL particle removal, resulting in a easily breakable
104
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
solid material. These transformations occurred due to the formation of high-carbon olefinic structures,
deviating from typical asphalt properties and developing quasi-coal systems.
Shaymaa AL-Mutalq and others ]8[ evaluates the fuel resistance and morphology of asphalt that has
been physicochemically modified using waste polymers, specifically high-density polyethylene and
chlorine gas. The high-density polyethylene waste polymer and chlorine gas are utilized to modify the
asphalt. The asphalt is modified through a physicochemical process involving the blending of the waste
polymer and chlorine gas with the original asphalt. The objective of the research is to investigate the
impact of these modifications on the fuel resistance of the asphalt and analyze the resulting changes in
its composition and morphology.
While numerous studies have explored the modification of asphalt with various polymers such as
rubber, research involving the incorporation of broken polystyrene into asphalt remains relatively
limited. Hailong et al. attempted to enhance the stability of stored asphalt by adding styrene-butadiene-
styrene (SBS) with sulfur to the mix [9]
In 2005, AL-Dubony and Ahmad [10] successfully prepared asphalt modified with polystyrene and
sulfur, resulting in a homogenous blend of asphalt, polystyrene, and sulfur.
Mousa Bani Baker et al. [11] added polystyrene waste by volume to bitumen in ratios of 0%, 5%,
10%, and 15%. Tests measuring penetration, softening point, ductility, flash point, and ignition point
were conducted. The results showed that increasing the polystyrene ratio in asphalt directly affected
bitumen properties by reducing penetration and ductility while increasing softening point, flash point,
and ignition point. Modified asphalt could be used in hot climate areas for various construction
purposes such as waterproofing materials for basements, retaining walls, surfaces, or as a material for
paving garage floors, car parks, sidewalks, playgrounds, and gardens.
As mentioned by Korshat Yeldiz et al. [12], waste polymers are widely used in asphalt modification,
especially to mitigate their environmental impact. This research discusses the possibility of using
expanded polystyrene (EPS) waste foam in asphalt modification. EPS foam waste produced during
production and use was mixed with bitumen in weight ratios of 2%, 4%, 6%, and 8%, using the dry
modification method. The physical and mechanical properties of the original bitumen were compared
with asphalt modified by EPS foam waste. A strong relationship between the physical properties of the
modified asphalt and the EPS foam ratio was observed. Decreases in penetration and ductility values
were noted. Additionally, statistical analyses indicated that a 2% increase in the additive ratio was not
sufficient to make a significant difference in the physical properties of bitumen.
Nader Nciri et al. [13] introduced wastes EPS foam into asphalt mixtures used in road construction.
Different ratios of waste from EPS foam, such as 2%, 4%, 6%, and 8% by weight were mixed with
asphalt binder. The physical and mechanical properties of the modified asphalt mixtures were then
evaluated.
Khaled Ramadan et al. [14] collected polystyrene in its wastes form, shredded it, washed it, and then
dried it before mixing it with original asphalt. A 70-80 penetration grade asphalt binder was used and
105
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
mixed with processed wastes polystyrene. The mixing ratios between polystyrene and asphalt (S/A)
were: 0.0% (reference sample), 0.2%, 0.4%, 0.6%, 0.8%, 1.0%, 1.2%, and 2% by weight of the asphalt
binder.
Building on previous research, this study aims to investigate the dual impact of chlorine and
polystyrene on the rheological properties of asphalt binder.
This resulting product has potential applications as a car fuel improver or could be used in reprocessing
the same polymer.
Additionally, the remaining styrene, once ground into fine particles, was blended into chlorinated
asphalt at three different ratios (1%, 2%, and 3%) while maintaining a temperature at 150 degrees
Celsius for two hours.
The chlorination process of asphalt was facilitated by iron chloride as a catalyst. Different temperature
levels were used during the chlorination process, as outlined in Table 1.
Degraded Polystyrene.
Devices Used:
- Penetration
- Ductility
106
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Sample Preparation :
Polystyrene was subjected to thermal degradation through direct heating, breaking down the polymer
into approximately 60% of its original weight in the form of styrene, the main component of the
polymer. The remaining material was then ground into fine particles and added to chlorinated asphalt at
three different ratios (1%, 2%, and 3%), with the process conducted at a temperature of 150 degrees
Celsius for 2 hours.
Testing Methods:
Asphalt binder samples were tested using penetration tests at 25 degrees Celsius (ASTM D6),
softening point tests (ASTM D36), ductility tests at 25 degrees Celsius (ASTM D113), and Thin Film
Oven Test (TFOT) ASTM (D6-80) to determine the optimal polymer content.
The thermal cracking process was implemented due to the polystyrene's difficulty in dissolving
within asphalt systems and its lack of compatibility with them. Consequently, partial cracking was
employed using heat and direct heating. In this process, the polystyrene is subjected to high
temperatures to break down its chemical bonds and convert it into smaller, less-ordered molecules. This
is achieved by heating the polystyrene to a temperature above its melting point, causing it to crack into
smaller, more reactive components. This procedure enhances the polystyrene's ability to blend with
asphalt and improves its mechanical properties and adhesion to other materials within the asphalt
system.
Chlorinated asphalt is a modified type of asphalt that is enhanced by adding chlorinated compounds
to it. Through this modification, asphalt acquires improved properties and additional benefits. Here are
some key characteristics of chlorinated asphalt:
Chemical resistance: Chlorinated asphalt enhances resistance to chemical corrosion resulting from
asphalt's reactions with harmful chemicals, such as acids and bases. This makes it suitable for use in
applications exposed to strong chemical substances, such as chemical industries and water treatment
plants.
Thermal resistance: Chlorinated asphalt is known for its resistance to thermal corrosion caused by
high temperatures and sudden temperature changes. Therefore, it can be used in applications exposed to
extreme thermal conditions, such as thermal industries and tropical regions.
Durability and flexibility: Chlorinated asphalt improves the durability of asphalt and its resistance to
cracking and deterioration. It also increases its flexibility, allowing it to withstand movements and
vibrations without rapid deterioration. As a result, chlorinated asphalt is used in road, pavement, and
sidewalk applications to provide a durable and corrosion-resistant surface.
Water resistance: Chlorinated asphalt has good resistance to water and moisture. It forms a water-
resistant layer on the surface, maintaining its stability and preventing water from penetrating into the
107
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
underlying asphalt. This makes it ideal for use in road, pavement, and plaza applications that require
water protection]19[.
Table 1 presents the physical properties of chlorinated asphalt using 1.5% from ferric chloride at
different temperatures. Meanwhile, Table 2 compares the physical properties of chlorinated asphalt
before and after adding 1% powdered polystyrene.
Table (2):Physical properties of chlorinated asphalt after adding (1%) of crushed polystyrene
Sample The Chlorinated asphalt in different Temperatures The Chlorinated asphalt after adding (1%) of
Number polystyrene
3 (130 oC) 63 30 65 65 20 30
4 (160 oC) 76 16 0 77 3 0
The data reveals the impact of adding polystyrene on the properties of chlorinated asphalt. With an
increase in polystyrene ratio as a solid substance, the asphalt's softening point rises while penetration
decreases. This result can be attributed to the increased hardness of the asphalt due to higher
polystyrene content, affecting penetration values and softening point. Furthermore, high temperatures
adversely affect asphalt models, stimulating reactions that remove HCl particles and begin forming
olefinic systems and double bonds, resulting in the development of more solid structure.
The comparison of results confirms the significant effect of polystyrene on the properties of
chlorinated asphalt, especially in terms of flexibility. Adding 1% polystyrene reduces flexibility to 70
cm, indicating that polystyrene reduces the adhesive properties of asphalt. Additionally, the impact of
high temperatures encourages the removal of HCl particles, making samples (1 and 2) suitable for use
as gap-filling and roof covering materials.
When asphalt systems are exposed to heat and over time, oxidation reactions occur. These reactions
result in the removal of hydrogen from asphalt molecules and the formation of olefinic bonds between
the remaining molecules. As a result, the hydrogen-to-carbon ratio in asphalt systems decreases, and
their hardness increases.
Over time, the oxidation and hydrogen removal process continues in asphalt systems, leading to a
decrease in the hydrogen content relative to carbon. The molecules become more intertwined and
bonded as more olefinic bonds are formed, thereby increasing the hardness of asphalt systems.
108
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
In general, heat and time affect asphalt systems through oxidation reactions and chemical changes
that occur. These processes result in a reduction in the hydrogen-to-carbon ratio and an increase in the
hardness of asphalt systems.
Conversely, Table 3 shows that adding 2% and 3% degraded polystyrene to chlorinated asphalt leads
to an increase in softening point and a decrease in penetration and flexibility. This change occurs due to
prolonged exposure to high temperatures, leading to the removal of HCl particles and leaving a higher
proportion of olefinic structures in the presence of polystyrene.
This, in turn, results in the formation of more complex and rigid structures compared to chlorinated
asphalt alone.
Due to the extreme hardness and susceptibility to fracture at low temperatures, these asphalt systems
cannot be effectively used for other purposes such as paving.
When temperatures decrease, the rigid asphalt transforms into a brittle form that is prone to breaking.
This means that it may crack and fracture under pressure or load. Consequently, it is not suitable for use
in paving applications that require withstanding traffic movement and mechanical stresses.
It is important to note that there are different types of asphalt systems used in paving, each with
varying compositions and properties. Flexible asphalt systems, specifically designed to withstand low
temperatures and accommodate expansion and contraction, are commonly employed in regions with
cold climates where temperatures are low.
Choosing the appropriate type of asphalt system is crucial for specific operating conditions.
In the case of chlorinated asphalt treated with 2% and 3% degraded polystyrene (samples 1 and 2),
the significant changes in penetration, ductility and softening point make them suitable for use as
waterproofing and thermal insulation materials.
Table (3) :Physical properties of chlorinated asphalt after adding (2% and 3%) of crushed polystyrene
Sample The chlorinated Asphalt before The Chlorinated Asphalt and 2% The Chlorinated Asphalt and 3%
Number adding the Polystyrene Polystyrene Polystyrene
2 58 38 + 100 64 28 35 67 17 10
3 63 30 165 68 15 20 73 6 0
4 76 16 0 80 0 0 82 0 0
able 3 illustrates with greater precision that, with an increase in the poly-styrene ratio, the properties of
asphalt change significantly, especially when exposed to higher temperatures. This alteration is
attributed to the formation of olefinic systems, leading to a reduction in oil and resin content in the
model. As a result, the values for permeability and flexibility reach zero (5.6).
Polystyrene is a type of solid polymer material with a high melting point compared to asphalt. It has a
molecular structure characterized by strong bonds between the particles, resulting in increased hardness
and rigidity of the models made from it.
The solid nature and high melting point of polystyrene enhance the hardness and stiffness of the
models. Polystyrene exhibits high resistance to corrosion and mechanical impacts, making it an ideal
material for applications that require strength and rigidity.
However, it's important to note that polystyrene and asphalt are completely different materials in
terms of composition and properties. The hardness and stiffness of the models are not solely determined
by one component but can also be influenced by other factors, such as the chemical composition of the
materials, operating conditions, and manufacturing processes.
In summary, polystyrene with its high melting point and hardness contributes to increased hardness
and rigidity of the models. However, it is necessary to consider other factors that may affect the
hardness and rigidity in asphalt applications.
Figure 1 visually demonstrates an increase in the softening point for various asphalt samples,
including regular asphalt, chlorinated asphalt, and chlorinated asphalt treated with 1%, 2%, and 3% of
shattered poly-styrene. Conversely, Figure 2 shows a decrease in penetration for chlorinated asphalt
after treatment with different proportions of poly-styrene, comparing it to natural asphalt.
110
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Conclusion
Adding chlorine to asphalt increases its melting point, and the degree of this impact is directly related
to the temperature used in the chlorination process. Simultaneously, the penetration and flexibility of
asphalt decrease, and the extent of this change depends on the temperature increase. Suitable asphalt for
road paving in high-temperature areas can be obtained by chlorination at lower temperatures.
Substituting hydrogen atoms with chlorine atoms allows asphalt to maintain its properties across a
range of temperatures. Chlorinating asphalt at high temperatures leads to an increase in the double bond
ratio, primarily due to the removal of HCl particles from the interconnected asphalt formation. This, in
111
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
turn, enhances cross-linking, resulting in a more rigid form of asphalt applicable in various fields, such
as filling gaps in different construction contexts. Adding shattered poly-styrene to chlorinated asphalt
raises its melting point while reducing penetration and flexibility. The decrease in flexibility values
becomes more pronounced when the poly-styrene content exceeds 1%, eventually reaching zero.
Treating chlorinated asphalt with poly-styrene yields more complex and rigid results compared to
chlorinated and regular asphalt. These outcomes present promising samples suitable for use as
construction materials in tasks such as gap filling, water insulation, and thermal insulation.
References
1. I.A. AL-Dubony and Kh.M. Salim, 2000, "Modifying the rheological characteristics of asphalt
by processing it with chlorine", University of Mosul, Mosul, Iraq.
2. James G.Speight, 2016,"Asphalt materials science and technology wyman street",walthem ,
MA02451,USA.
3. Abdulhaq H. Al-Haddad, 2020,"Investigation of Rheological Properties of Iraqi Asphalt
Cement", IOP Conf. Ser.: Mater. Sci. Eng. 737 012134
4. Rand R. Matti and Khalid A. Owaid ,2020, "Rheological modifications of the asphalt-polymer
system using microwave technology", Journal of Education and Science, Vol. 29,
5. I.A. AL-Dubony and A.H. Lateef, 1986, "Oil the origin ,structure and technology", University
of Mosul, Mosul , Iraq.
6. Moschopedis S. E. and Speight J. G., 1971,"Chlorination of Asphalt",Fuel ,Vol. 50,p28
7. V. I. Antonishin and I. I.Makarachak, 1975, "Chlorination of Bitumen", Chem. Abst.,
Vol.82,p173344m-640.
8. Shaymaa Al-Mutlaq, Faridah Sonsudin, Ehab Mahal, Rosiyah Yahya; 2014, Asphalt – Polymer
Blends: Leverage of Chlorine Gas on the Topography, Thermal Stability and Fuel Resistance;
International Journal of Scientific and Engineering Research 5(4):427-437,
9. HailongJ. ;Guangta G. ;Yong Z. ;Yinxi z. ;Kang S. and Yong Zhong F., 2002, "Improved
properties of Polystyreen-modified Asphalt Through Dynamic Vulcanization", Polymer testing,
Vol.21,pp633-640.
A. A. AL-Dubony and A. A. Ahmed, 2005,"Modification of rheological characteristics of
Asphalt by processing it with Polystyrene", University of Mosul, Mosul,Iraq.
10. No.2, pp.26-44
11. Mousa Bani Baker, Raed Abendeh, Zaydoun Abu-Salem and Taisir Khedaywi, 2016,
Production of Sustainable Asphalt Mixes UsingRecycled Polystyrene, International Journal of
Applied Environmental Sciences, Volume 11, Number 1, pp. 183-192.
12. Kürşat Yıldız, Harun Kınacı, Mert Atakan,2021, Modification of Asphalt Binder with Waste
Expanded Polystyrene (EPS)Foam, Celal Bayar University Journal of Science, Volume 17,
Issue 3, p 245-252.
13. Nader Nciri, Taesub Shin and Namjun Cho,2020, Towards the Use of Waste Expanded
Polystyrene as Potential Modifier for Flexible Road Pavements, materials today proceedings,
Volume 24, Part 2, Pages 763-771.
14. Khaled Ramadan, Ghazi Al-Khateeb and Madhar M. Taamneh, 2019, Mechanical properties of
styrofoam-modified asphalt binders, International Journal of Pavement Research and
Technology, 10.1007/s42947-019-0102-4.
15. ASTM ,1972 ,Part 11 ,(D36 ,70) ,p 27.
112
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
113
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Eman A. Mansour
114
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Eman A. Mansour
Abstract
1. Introduction:
The differential-algebraic equation is an equation that consists of two parts, differential
and algebraic; the algebraic part of the equation is called the dominant restriction of the
equation [1]. The origins of differential-algebraic equations theory can be traced back to
the work of K. Wein and L. Kronecker, who parameterized families of bilinear forms in
1868 [2].
Differential algebraic systems like multibody systems control theory and electrical
network analysis can model many systems in science and engineering. Applications of
differential-algebraic equations are also found in chemistry, magnetohydrodynamics,
115
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
neutral networks, fault diagnosis model identification, observer design, and robotics.
Differential algebraic equations also arise from problems in other branches of
mathematics, such as the discretization of partial differential equations, root-finding, or
optimization [1,2].
The general formula of a differential algebraic equation is [3-8]:
There are two cases for the partial derivative ; the first is when is nonsingular,
then it becomes possible to solve equation (1) for and obtain an ordinary differential
equation. However, if is singular, then finding the solution for equation (1) is no
longer possible, and the solution has to satisfy certain algebraic constraints.
116
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
Considering that the to the Jacobian matrix , then it is possible to reduce the
Jacobian matrix to via linearization process. That reduction can be represented as:
3.1Hurwitz Criterion
The conditions of the Hurwitz stability criterion for a polynomial’s coefficients can be
written as [6,10]:
The condition that all a’s must be real quantities should be satisfied to ensure all the
roots have negative real parts (not positive imaginary or zero). The insurance to the
positive real criteria in all roots required the positivity of all coefficients. The mentioned
condition is a necessity; however, it is not practical [6,10].
By considering all coefficients of the polynomial are positive, it is possible to arrange
these coefficients in a determinant as:
117
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
In the previous determinant, zeros have been substituted for a’s for all , or where s
is the number of a’s.
For stability purposes, aka (all the roots to have negative real parts), successive
principal minors must be positive values, as shown below:
In the above determinant, the same conditions are applied to the lower-order
determinants and upper-order determinants. The system is considered equilibrium
(asymptomatically stable) if all determinants are positive and , and the system
characteristic is given by equation (3). It should be noted that only the signs in the above
determinant must be taken into consideration during the solving process [6,9,10].
118
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
The asymptomatic stability conditions mentioned earlier in which all a’s are positive
values, , and are satisfied. That will cause all the roots of the given
polynomial to be real and negative.
Where represents the identity matrix and is the reduced Jacobian matrix.
So,
119
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
The following application is to clarify the proposed approach through the use of actual
numbers:
Let:
The conditions for asymptomatic stability are that all of the a’s are positive and
are applied. Therefore, all the roots of the given example have negative
real parts. Furthermore, that gives stability to the system.
5. Conclusions
The superiority of ordinary differential equations comes from their ease and stability,
which gave them popularity among mathematicians, who use them to solve many
problems in many fields. On the contrary, the stabilization issues related to the structure
of the differential algebraic equations make them harder to invest in various fields.
This work studies the stability of the resulting ordinary differential equations that result
from converting differential-algebraic equations into them and how much the resulting
equations abide by predefined conditions. A new transforming method that uses
120
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
linearization and, depending on the Hurwitz criterion, is proposed, and its results are
studied and prove its ability to provide a stable ordinary differential equation via
practical application.
References
[1] Simmons, G. F. (2016). Differential equations with applications and historical notes.
CRC Press.
[2] Diab, M. (2022). Splitting Methods for Partial Differential-Algebraic Systems with
Application on Coupled Field-Circuit DAEs. Humboldt Universitaet zu Berlin
(Germany).
[3] Di Franco, P., Scarciotti, G., & Astolfi, A. (2020). Stability of nonlinear differential-
algebraic systems via additive identity. IEEE/CAA Journal of Automatica Sinica, 7(4),
929-941.
[4] Milano, F. (2016). Semi-implicit formulation of differential-algebraic equations for
transient stability analysis. IEEE Transactions on Power Systems, 31(6), 4534-4543.
[5] Tan, Y. K., & Platzer, A. (2021, March). Deductive stability proofs for ordinary
differential equations. In International Conference on Tools and Algorithms for the
Construction and Analysis of Systems (pp. 181-199). Cham: Springer International
Publishing.
[6] Li, B., Ding, J., & Li, Y. (2019). L-Stable Method for Differential-Algebraic
Equations of Multibody System Dynamics. Mathematical Problems in
Engineering, 2019.
[7] Kononov, A. D., & Shcheglova, A. A. (2020). Stability of an interval family of
differential-algebraic equations. Journal of Computer and Systems Sciences
International, 59, 828-844.
[8] Beykal, B., Onel, M., Onel, O., & Pistikopoulos, E. N. (2020). A data‐driven
optimization algorithm for differential algebraic equations with numerical
infeasibilities. AIChE Journal, 66(10), e16657.
121
Journal of Natural and Applied Sciences URAL No: 5, Vol: 1\ February \ 2024
[9] Machowski, J., Lubosny, Z., Bialek, J. W., & Bumby, J. R. (2020). Power system
dynamics: stability and control. John Wiley & Sons.
[10] Xiong, L., Liu, X., Liu, Y., & Zhuo, F. (2020). Modeling and stability issues of
voltage-source converter-dominated power systems: A review. CSEE Journal of Power
and Energy Systems, 8(6), 1530-1549.
122