Hormones, their receptors, and the associated signaling pathways make compelling drug targets because of their wide-ranging biological significance to study the role of asprosin in obese male patients with diabetic mellitus type II. ELISA method was used to assay asprosin and insulin. Blood was taken with drawn sample from 30 obese normal patients with age range (40-60) years, 30 diabetic patients with age range (40-60) years at duration of disease (1-5) years and 30 normal healthy patients. The mean difference between T2DM according to insulin % (23.8±0.6) was increased than the mean of IFG (17.7±1.0) (P 0.000). The mean difference between T2DM according to asprosin (122.1±21.8) was increased than the mean of IFG (51.4±2.7) (P 0
... Show MoreThe most common artifacts in ultrasound (US) imaging are reverberation and comet-tail. These are multiple reflection echoing the interface that causing them, and result in ghost echoes in the ultrasound image. A method to reduce these unwanted artifacts using a Otsu thresholding to find region of interest (reflection echoes) and output applied to median filter to remove noise. The developed method significantly reduced the magnitude of the reverberation and comet-tail artifacts. Support Vector Machine (SVM) algorithm is most suitable for hyperplane differentiate. For that, we use image enhancement, extraction of feature, region of interest, Otsu thresholding, and finally classification image datasets to normal or abnormal image.
... Show MoreIn this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreRecently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando
... Show MoreComplement activation leads to membrane attack complex formation, which can lyse not only pathogens but also host cells. Histones can be released from the lysed or damaged cells and serve as a major type of damage-associated molecular pattern, but their effects on the complement system are not clear. In this study, we pulled down two major proteins from human serum using histone-conjugated beads: one was C-reactive protein and the other was C4, as identified by mass spectrometry. In surface plasmon resonance analysis, histone H3 and H4 showed stronger binding to C4 than other histones, with KD around 1 nM. The interaction did not affect C4 cleavage to C4a and C4b. Because histones bin
Background: The finite element method (FEM) is expected to be one of the most effective computational tools for measuring the stress on implant-supported restorations. This study was designed using the 3D-FEM to evaluate the effect of two adhesive luting types of cement on the occlusal stress and deformation of a hybrid crown cemented to a mono-implant. Materials and Method: The mono-screw STL file was imported into the CAD/CAM system library from a database supported by De-Tech Implant Technology. This was to assist in the accurate reproduction of details and design of a simulated implant abutment. Virtually, a digital crown was designed to be cemented on an abutment screw. A minimum occlusal thickness of 1mm and marginal fitting of 1.2
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show More