A total of 258 voluntary blood donors (males 101; females 157) in the age range of 18-52 yr among males and 18-55 yr among females were examined for Toxoplasma gondii antibodies (IgG), and (IgM) by immunological technique (Enzyme linked Immunosorbant Assay) during the period from March 2009 to April 2010. This study covered a wide range of factors including immunological, age ,sex , place of residence and symptoms that may have a possible relationship with toxoplasmosis. Results presented in this study showed clearly that 38 (14.7%) of individuals participated in this study having IgG Toxoplasma Ab, among those 10 samples (9.9%) were males and 28 samples (17.8%) were females. Moreover, we found the prevalence of IgM seropositivity in the study population to be 5.8% ,as well as, the prevalence of IgM was 1.98 % in males and 8.3% in females. In addition to , the results of current study indicated that the seroprevalence of IgG Toxoplasma antibodies are more than IgM antibodies ,besides , the peak period range of toxoplasma gondii antibodies IgG among males donors was 30 to 39 years, while among female donors, the highest detection of Toxoplasma gondii antibodies IgG was between the ages of 40 to 49. What's more, the peak age range of Toxoplasma gondii antibodies IgM among males and females donors was 19 to 29 years. In conclusion , Our study showed a high prevalence of T. gondii antibodies in healthy voluntary blood donors. It may be appropriate to include screening test (ELISA) for T. gondii also in the pre transfusion blood testing schedule.
The Elliptic Curve Cryptography (ECC) algorithm meets the requirements for multimedia encryption since the encipher operation of the ECC algorithm is applied at points only and that offer significant computational advantages. The encoding/decoding operations for converting the text message into points on the curve and vice versa are not always considered a simple process. In this paper, a new mapping method has been investigated for converting the text message into a point on the curve or point to a text message in an efficient and secure manner; it depends on the repeated values in coordinate to establish a lookup table for encoding/ decoding operations. The proposed method for mapping process is&
... Show MoreAlthough the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .
In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet
... Show MoreThe increasing amount of educational data has rapidly in the latest few years. The Educational Data Mining (EDM) techniques are utilized to detect the valuable pattern so that improves the educational process and to obtain high performance of all educational elements. The proposed work contains three stages: preprocessing, features selection, and an active classification stage. The dataset was collected using EDM that had a lack in the label data, it contained 2050 records collected by using questionnaires and by using the students’ academic records. There are twenty-five features that were combined from the following five factors: (curriculum, teacher, student, the environment of education, and the family). Active learning ha
... Show MoreMore than 95% of the industrial controllers in use today are PID or modified PID controllers. However, the PID is manually tuning to be responsive so that the Process Variable is rapidly and steady moved to track the set point with minimize overshoot and stable output. The paper presents generic teal-time PID controller architecture. The developed architecture is based on the adaption of each of the three controller parameters (PID) to be self- learning using individual least mean square algorithm (LMS). The adaptive PID is verified and compared with the classical PID. The rapid realization of the adaptive PID architecture allows the readily fabrication into a hardware version either ASIC or reconfigurable.
The effect of the initial pressure upon the laminar flame speed, for a methane-air mixtures, has been detected paractically, for a wide range of equivalence ratio. In this work, a measurement system is designed in order to measure the laminar flame speed using a constant volume method with a thermocouples technique. The laminar burning velocity is measured, by using the density ratio method. The comparison of the present work results and the previous ones show good agreement between them. This indicates that the measurements and the calculations employed in the present work are successful and precise
Photonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and the characterization of a relative humidity sensor based on a polymer-coated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) transmission mode. The fabrication of the sensor involved splicing a short (1 cm) length of Photonic Crystal Fiber (PCF) between two single-mode fibers (SMF). It was then coated with a layer of agarose solution. Experimental results showed that a high humidity sensitivity of 29.37 pm/%RH was achieved within a measurement range of 27–95%RH. The sensor also showed good repeatability, small size, measurement accuracy and wide humidity range. The RH sensitivity o
... Show MoreOil price forecasting has captured the attention of both researchers and academics because of the unique characteristics of crude oil prices and how they have a big impact on a lot of different parts of the economic value of the product. As a result, most academics use a lot of different ways to predict the future. On the other hand, researchers have a hard time because crude oil prices are very unpredictable and can be affected by many different things. This study uses support vector regression (SVR) with technical indicators as a feature to improve the prediction of the monthly West Texas Intermediate (WTI) price of crude oil. The root mean square error (RMSE), mean absolute error (MAE), and mean absolute percentage error (MAPE) measur
... Show MoreIn this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.
Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of
... Show MoreIn modern hydraulic control systems, the trend in hydraulic power applications is to improve efficiency and performance. “Proportional valve” is generally applied to pressure, flow and directional-control valves which continuously convert a variable input signal into a smooth and proportional hydraulic output signal. It creates a variable resistance (orifice) upstream and downstream of a hydraulic actuator, and is meter in/meter out circuit and hence pressure drop, and power losses are inevitable. If velocity (position) feedback is used, flow pattern control is possible. Without aforementioned flow pattern, control is very “loose” and relies on “visual” feed back by the operator. At this point, we should examine how this valv
... Show More