The primary objective of this paper is to introduce a new concept of fibrewise topological spaces on D is named fibrewise multi- topological spaces on D. Also, we entroduce the concepts of multi-proper, fibrewise multi-compact, fibrewise locally multi-compact spaces, Moreover, we study relationships between fibrewise multi-compact (resp., locally multi-compac) space and some fibrewise multi-separation axioms.
Background: Multifactor affect the pathogenesis of thrombosis in solid malignancy; however, a significant role is attributed to the cancer cells ability to interact with and activate the host hemostatic system. [1]
Hemostasis is highly correlated to tumor growth, angiogenesis and metastasis, modulation of these pathways reflects interesting and promising treatment options in the future. [1]
Most patients with cancer frequently suffer from chronic compensated DIC and have abnormal laboratory coagulation tests without clinical manifestations of thrombosis, which is a subclinical hypercoagulable state that can be detected by varying degrees of activation of blood clotting. The results of laboratory tests in th
... Show MoreThe harmonic oscillator (HO) and Gaussian (GS) wave functions within the binary cluster model (BCM) have been employ to investigate the ground state neutron, proton and matter densities as well as the elastic form factors of two- neutron 6He and 16C halo nuclei. The long tail is a property that is clearly revealed in the density of the neutrons since it is found in halo orbits. The existence of a long tail in the neutron density distributions of 6He and 16C indicating that these nuclei have a neutron halo structure. Moreover, the matter rms radii and the reaction cross section (𝜎𝑅 ) of these nuclei have been calculated using the Glauber model.
4-amino-3-(4-(((4-hydroxy-3, 5dimethoxybenzyl) oxy) methyl) phenyl)-1, 2, 4-triazole-5-thione was synthesized by to method the first one from melt reaction of 4-(((4-hydroxy-3, 5-dimethoxybenzyl) oxy) methyl) benzoic acid with Thiocarbonyldihydrazide, the second method from convert the corresponded acid hydrazide to potassium 2-(4-(((4-hydroxy-3, 5-dimethoxybenzyl) oxy) methyl) benzoyl) hydrazinecarbodithioate salt then react with hydrazine hydrate. Newly Schiff base (7a-7f) were synthesized from reaction the 4-amino-1, 2, 4-triazol with substituted hydroxybenzaldehyde. The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2, 2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays
... Show MoreThe background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art
... Show MoreFor a mathematical model the local bifurcation like pitchfork, transcritical and saddle node occurrence condition is defined in this paper. With the existing of toxicity and harvesting in predator and prey it consist of stage-structured. Near the positive equilibrium point of mathematical model on the Hopf bifurcation with particular emphasis it established. Near the equilibrium point E0 the transcritical bifurcation occurs it is described with analysis. And it shown that at equilibrium points E1 and E2 happened the occurrence of saddle-node bifurcation. At each point the pitch fork bifurcation occurrence is not happened.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show Moretotal of 17 Escherichia coli isolates were collected from urine specimens of patients with urinary tract infection. Antibiotics sensitivity test indicated that amikacin followed by chloramphenicol and ciprofloxacin are the most effective antibiotics. The isolates showed multidruge resistant, nine isolates were resistant to 11-15 antibiotics, 3 were resistant to 16-20 antibiotics and 5 were resistant to 21-25 antibiotic. Two isolates were selected, the first (ED1) was resistant to (22) antibiotics while the second isolate (ED2) was resistant to (14) antibiotics (out of 25). Minimum inhibitory concentration (MIC) of the black and green tea water boiled extracts were determined towards (ED1,ED2).Results showed that MIC of black tea extr
... Show More