This study aimed to isolate and phenotype lymphocytes in untreated children patients with chronic allergic asthma. To reach such aim the study involved (25) patients from children (17 male and 9 female) whom their ages where between (3-10) years, in addition to (15) apparently healthy children (9 male and 6 female) in the same ages involved as control group. The data demonstrated that there was a significant increase in the mean percentages of T-lymphocytes (CD3+ cells) in the peripheral blood of patients (66.75±0.29)**, in comparison with control group (43.58±0.19), a significant increase in the mean percentages of T-helper lymphocytes (CD4+ cells) in the peripheral blood of patients (51.14±0.55), in comparison with control group (39.17±0.23) and the mean percentages of B-lymphocytes (CD20+ cells) was also increased significantly in the peripheral blood of patients (29.63±0.20) when it compared with the mean percentages of the same cells in control group (18.60±0.80). Besides a significant decrease in the mean percentages of T-suppressor lymphocytes (CD8+ cells) in the peripheral blood of patients (11.31±0.05), in comparison with control group (16.42±0.15). Finally the results of this study showed a significant increase in the mean percentages of the ratio of (CD4+ cells/CD8+ cells) in the peripheral blood of patients (55.34±0.41), in comparison with control group (31.25±0.09).
Circular data (circular sightings) are periodic data and are measured on the unit's circle by radian or grades. They are fundamentally different from those linear data compatible with the mathematical representation of the usual linear regression model due to their cyclical nature. Circular data originate in a wide variety of fields of scientific, medical, economic and social life. One of the most important statistical methods that represents this data, and there are several methods of estimating angular regression, including teachers and non-educationalists, so the letter included the use of three models of angular regression, two of which are teaching models and one of which is a model of educators. ) (DM) (MLE) and circular shrinkage mod
... Show MoreThis paper determined the difference between the first image of the natural and the second infected image by using logic gates. The proposed algorithm was applied in the first time with binary image, the second time in the gray image, and in the third time in the color image. At start of proposed algorithm the process images by applying convolution to extended images with zero to obtain more vision and features then enhancements images by Edge detection filter (laplacion operator) and smoothing images by using mean filter ,In order to determine the change between the original image and the injury the logic gates applied specially X-OR gates . Applying the technique for tooth decay through this comparison can locate inj
... Show MoreIn this paper, some estimators for the unknown shape parameter and reliability function of Basic Gompertz distribution have been obtained, such as Maximum likelihood estimator and Bayesian estimators under Precautionary loss function using Gamma prior and Jefferys prior. Monte-Carlo simulation is conducted to compare mean squared errors (MSE) for all these estimators for the shape parameter and integrated mean squared error (IMSE's) for comparing the performance of the Reliability estimators. Finally, the discussion is provided to illustrate the results that summarized in tables.
Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreFive samples of the ternary alloy Ge-S-Cd were created using the melting point method, and the effects of partially substituting cadmium for germanium were determined. and partial substitution of germanium by cadmium was used to study the change in electrical conductivity. Electrical experiments were performed on Ge35-xS65Cdxternary alloy with x = 0, 5, 10, 15, and 20. It was discovered that the conductivity (σdc) rises with rising temperature in all samples under experiment. This confirms that the samples have semiconductor behavior. It has been observed that there are three regions of electrical conductivity in the electrical conductivity curve at low, moderate, and high temperatures. The pr
... Show MoreThis present work is concerned with one of the syntactic issues that has been researched by many linguists, grammarians, and specialists in Islamic studies, the estimated answer to a condition. However, this topic is researched this time by examining Imam Al-Qurtbi’s opinions in interpreting related ayas from the holly Quraan in his book (Collector of Quranic Rules) or its transliteration (Al-Jami’ Li Ahkam Al-Quran). Such a step involves commenting on, tracking what Al-Qurtbi said in this regard, discussing it from the points of view of other grammarians, and judging it accordingly, taking into account the apparent surface structures of the examples collected. To achieve this objective, the inductive analytical approach has be
... Show MoreIn this paper, the density of state (DOS) at Fe metal contact to Titanium dioxide semiconductor (TiO2) has been studied and investigated using quantum consideration approaches. The study and calculations of (DOS) depended on the orientation and driving energies. was a function of TiO2 and Fe materials' refractive index and dielectric constant. Attention has focused on the effect of on the characteristic of (DOS), which increased with the increasing of refractive index and dielectric constant of Fe metal and vice versa. The results of (DOS) and its relation with and values of system have been discussed. As for contact system is increased, (DOS) values increased at first, but the relation is disturbed later and transforms into an inve
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThis work deals with the production of light fuel cuts of (gasoline, kerosene and gas oil) by catalytic cracking treatment of secondary product mater (heavy vacuum gas oil) which was produced from the vacuum distillation unit in any petroleum refinery. The objective of this research was to study the effect of the catalyst -to- oil ratio parameter on catalytic cracking process of heavy vacuum gas oil feed at constant temperature (450 °C). The first step of this treatment was, catalytic cracking of this material by constructed batch reactor occupied with auxiliary control devices, at selective range of the catalyst –to- oil ratio parameter ( 2, 2.5, 3 and 3.5) respectively. The conversion of heavy vacuum gas
... Show More