The purpose of this research was to investigate the beneficial effects of phosphatidylcholine in reducing changes in both lipid and protein profiles in addition to atherogenic index in adult rats with fructose-induced metabolic syndrome. Thirty-six mature Wistar Albino female rats (Rattus norvegicus) (aged 12-15 weeks and weighing 200±10 g) were divided randomly into four groups (G1, G2, G3, and G4); then variable treatments were orally administered for 62 days as follows: G1 (Control group), received distilled water; G2, treated with phosphatidylcholine (PC) orally (1 g/kg BW); G3 (Fr), orally dosed with 40% fructose and 25% fructose mixed with drinking water; G4 (Fr+PC), were also intubated with 40% fructose and 25% fructose in drinking water, and received PC at 1 g/kg BW by oral tube. At the end of the research, specimens were taken by cardio puncture approach after fasting for 8-12 h. Serum was obtained to measure lipid criteria (total serum cholesterol, triacylglycerol, high-density lipoprotein-cholesterol, low-density lipoprotein-cholesterol, very low-density lipoprotein-cholesterol, non-high-density lipoprotein-cholesterol, and Atherogenic index) and protein profile (total protein, albumin, and globulins). The results showed that the occurrence of dyslipidaemia (hypercholesterolemia, triacyleglycerolemia) increase in low density of lipoprotein-cholesterol, very low-density lipoprotein-cholesterol, no-high density lipoprotein-cholesterol concentrations and atherogenic index and reduce the concentration of high-density lipoprotein-cholesterol) in fructose treated animals in addition to disturbance in protein profile (lowered in total protein and globulins level).PC treatment resulted in decreased changes in lipid profile, protein profile, and atherogenic index in rats, whereas fructose induced metabolic syndrome. In conclusion, using Phosphatidylcholine treatment in rats may reduce the changes of lipid and protein profiles and atherogenic index while fructose may lead to metabolic syndrome.
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show MoreAny software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show More