Akaike’s Information Criterion (AIC) is a popular method for estimation the number of sources impinging on an array of sensors, which is a problem of great interest in several applications. The performance of AIC degrades under low Signal-to-Noise Ratio (SNR). This paper is concerned with the development and application of quadrature mirror filters (QMF) for improving the performance of AIC. A new system is proposed to estimate the number of sources by applying AIC to the outputs of filter bank consisting quadrature mirror filters (QMF). The proposed system can estimate the number of sources under low signal-to-noise ratio (SNR).
Many previous investigations have found quercetin to be a powerful antioxidant and antitumor flavonoid, but its poor bioavailability has limited its use. This current study investigated the effects of two newly synthesized Quercetin Schiff bases containing 2-amino thiadiazole-5-thiol (Q1), and its benzyl derivatives (Q2) on MCF-7 human breast cancer cells. Cell viability and apoptosis were assessed to determine the toxic effects of Q1 and Q2. Cytotoxicity valuation showed that both compounds inhibited MCF-7 cell growth, and lactate dehydrogenase (LDH) activity increased in a dose-dependent aspect compared to the control group. Comet assay results observed that Q1 and Q2 induce more serious DNA damage than the control (untreated cell
... Show MoreTitanium dioxide nanoparticles (TiO2 NPs) are generally used in different types of applications such as the industry of plastics, paper industry, paints, toothpaste, cosmetics, sunscreens, and in various lifestyles, because of the vast range of applications and our daily exposure to these nanoparticles and a lack of information on animal and human health this study was designed to reveal dose and time-dependent effects of TiO2-NPs on the thyroid gland and kidney functions in male rats.
For this study 54, Sprague-Dawley albino adult male rats were classified into three main groups each of 18 rats treated for a particular duration (1,2, and 4) weeks respectively. Each group was subdivided i
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreNew evidence on nanotechnology has shown interest in the creation and assessment of nanoparticles for cancer treatment. Worldwide, a wide range of tumor-targeted approaches are being developed to reduce side effects and boost the efficacy of cancer therapy. One strategy that shows promise is the use of metallic nanoparticles to increase the radio sensitization of the cancer cells while reducing or maintaining the normal tissue complication probability during radiation therapy. In this study, atmospheric plasma was created using argon gas to create Au NPs using the plasma jet scheme, and their ability to induce apoptosis as an anticancer mechanism was tested. Aqueous gold tetrachloride salts (HAuCl4·3H2O) ere used to produce gold nanopartic
... Show MoreAbstract: Recombinant human bone morphogenetic protein-2 (rhBMP-2) and platelet-rich fibrin (PRF) bioactive materials have been used to enhance healing and improve dental implant stability. This study aimed to compare the effect of rhBMP-2 and PRF bioactive materials on dental implant stability at different intervals and to evaluate the correlation of implant length and diameter with implant stability. Two bioactive materials were compared to evaluate their effect on dental implant stability. A total of 32 patients (102 dental implants) were divided into 3 groups: 24 dental implants with bone morphogenetic protein (BMP), 27 dental implants with PRF, and 51 dental implants without BMP or PRF (control group). Data were statistically analyzed
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More