Article information: COVID-19 has roused the scientic community, prompting calls for immediate solutions to avoid the infection or at least reduce the virus's spread. Despite the availability of several licensed vaccinations to boost human immunity against the disease, various mutated strains of the virus continue to emerge, posing a danger to the vaccine's ecacy against new mutations. As a result, the importance of the early detection of COVID-19 infection becomes evident. Cough is a prevalent symptom in all COVID-19 mutations. Unfortunately, coughing can be a symptom of various of diseases, including pneumonia and inuenza. Thus, identifying the coughing behavior might help clinicians diagnose the COVID-19 infection earlier and distinguish coronavirus-induced from non-coronavirus-induced coughs. From this perspective, this research proposes a novel approach for diagnosing COVID-19 infection based on cough sound. The main contributions of this study are the encoding of cough behavior, the investigation of its unique characteristics, and the representation of these traits as association rules. These rules are generated and distinguished with the help of data mining and machine learning techniques. Experiments on the Virufy COVID-19 open cough dataset reveal that cough encoding can provide the desired accuracy (100%).
In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.
One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.
In this paper the amplitude and the phase shift of the received signal were calculated according to the orig
... Show MoreBackground: The influence of glucose metabolism is seen in many infectious diseases, making diabetic patients more vulnerable to sepsis and other serious sequelae of bacterial invasion such as UTI and vaginitis.Patients and method: sixty two patients (women) were suffering from GUTIs consulting Al-Elwya hospital from November- 2009 to March -2010. Two samples were taken from those patients (urine samples and vaginal swabs); these samples were cultured on Blood, Chocolate, and MacConkey's agar for isolation of bacteria.Results: The study group consists of sixty two women suffering from (GUTI), their ages range from 18-55 years. Thirty eight of them were diabetic women and twenty four of them were non- diabetic women. Twenty t
... Show MoreAbstract
It considers training programs is an important process contributing to provide employees with the skills required to do their jobs efficiently and effectively, so it should be concerned with and the focus of all government our organizations, and perhaps the most important reasons that I was invited to select the subject (evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption) It is the importance of those programs working in the regulatory institutions General and the Office of Inspector General of Finance and the Ministry particularly for employees because of their role in the development of their skills and their experience and their beha
... Show MoreIn this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for
... Show MoreIn this work the concept of semi-generalized regular topological space was introduced and studied via semi generalized open sets. Many properties and results was investigated and studied, also it was shown that the quotient space of semi-generalized regular topological space is not, in general semi-generalizedspace.
By use the notions pre-g-closedness and pre-g-openness we have generalized a class of separation axioms in topological spaces. In particular, we presented in this paper new types of regulαrities, which we named ρgregulαrity and Sρgregulαrity. Many results and properties of both types have been investigated and have illustrated by examples.
Leishmania major is a protozoan parasite that causes cutaneous Leishmaniasis disease in human beings and animals. The disease is prevalent in tropical and semitropical countries and has great health importance. The present study aimed to identify the histological changes in the organs infected with L. major and to provide a sophisticated diagnostic method for infection through detecting TGF-β cytokine by immunohistochemistry technique(IHC) from October 2020 to January 2021. A total of 40 samples of paraffin blocks were used for different organs including skin, spleen, liver, kidney, and heart of male and female BALB/c mice, aged 6-8 weeks, which were previously infected subcutaneously with L. major promastigotes at a dose of 1×107 promast
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More