In this paper, some estimators for the reliability function R(t) of Basic Gompertz (BG) distribution have been obtained, such as Maximum likelihood estimator, and Bayesian estimators under General Entropy loss function by assuming non-informative prior by using Jefferys prior and informative prior represented by Gamma and inverted Levy priors. Monte-Carlo simulation is conducted to compare the performance of all estimates of the R(t), based on integrated mean squared.
The present study was undertaken in order to investigate the role of gentamicin in the gene expression of toxA in Pseudomonas aeruginosa isolated from cow mastitis. A total of ten P. aeruginosa strains originally isolated from cows infected with mastitis. Agar dilution methodology was performed to determine the minimal inhibitory concentration of gentamicin, all of which developed resistance toward gentamicin. The findings presented here demonstrated that all these strains harboured toxA depending on PCR-based assay. Nonetheless, RT-PCR technique revealed a wide variation in expression of toxA. Moreover, the cultivation of P. aeruginosa in the presence of gentamicin, significantly (P< 0.05), induced the expression of toxA, in addition to th
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreCadmium oxide (CdO) thin films were deposited using the sequencing ion layer adsorption and reaction (SILAR) method. In this study, the effect of the pH value of an aqueous solution of cadmium acetate at a concentration of 0.2 mol of the cadmium oxide film was determined. The solution source for the cadmium oxide film was cadmium ions and an aqueous ammonia solution. The CdO films were deposited on glass substrates at a temperature of 90 ℃. The cadmium oxide film thickness was determined by the weight difference method at pH values (7.2, 8.2). X-ray diffraction (XRD) and scanning electron microscopy (SEM) showed that the size of the crystals increased with the increase in the solution (pH). While the UV-visible spectra of the fil
... Show MoreBackground: Asthma is a common chronic disease in children in which the body’s airways swell, preventing the lungs from filling with air, there are many different inflammatory cells involved in asthma which can synthesize and release cytokines which are recognized to be important in chronic inflammation and play a critical role in the inflammatory response. Objectives: to assess the local effect of ICS on oral tissue by measuring Interlukine-12 level and Candida albicans colony in saliva among12 year's old asthmatic children who were collected from AL- Zahra Center Advisory for Allergy and Asthma, and compares them with non-asthmatic children of the same age and gender.Type of the study: Cross –sectional study.Methods: The total samp
... Show MoreAbstract
The current research aims to identify the effectiveness of social stories in increasing social interaction among children with an autism spectrum disorder. The researcher used the single-subject design methodology (Single Subject Designs, SSD) with
(A-B) design to answer the research questions. The study sample consisted of (3) children with autism spectrum disorder enrolled in a transit daycare center in the Asir region, Saudi Arabia. The results of the study showed that there is a positive functional relationship between social stories and play to increase social interaction among children with autism spectrum disorder, which contributed to the acquisition and generalization of this behav
... Show MoreThe process of identifying the region is not an easy process when compared with other operations within the attribute or similarity. It is also not difficult if the process of identifying the region is based on the standard and standard indicators in its calculation. The latter requires the availability of numerical and relative data for the data of each case Any indicator or measure is included in the legal process
Back ground: One out of six children in the
world today is involved in child labor, doing
work that is damaging to his or her mental,
physical and emotional development.
Objective: Assessment of some health
problems among the studied working children.
Method; A cross-sectional study was
conducted in Al Amen Primary Health Care
(PHCC) during the period from January to
August 2009, a sample of 6048 children were
selected randomly(3218girls and2866 boys age
between 5-17 years ) and interviewed to collect
information using a structured questionnaire
form, information related to different aspects
of child labor prevention were included in the
form as well as a general medical examination
and lab