In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.
Image contrast enhancement methods have been a topic of interest in digital image processing for various applications like satellite imaging, recognition, medical imaging, and stereo vision. This paper studies the technique for image enhancement utilizing Adaptive Histogram Equalization and Weighted Gamma Correction to cater radiometric condition and illumination variations of stereo image pairs. In the proposed method, the stereo pair images are segmented together with weighted distribution into sub-histograms supported with Histogram Equalization (HE) mapping or gamma correction and guided filtering. The experimental result shows the experimented techniques outperform compare with the original image in ev
... Show MoreRotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreThe influence of bias current on the bandwidth of chaotic signals in semiconductor lasers by optical feedback has been studied experimentally and numerically. The measured data reveal that the bandwidth increase when the system becomes chaotic and this chaotic signal has a broadband spectrum so it can be used as a carrier for the quantum key. Mixing chaotic signal and quantum key make a very small change in chaotic bandwidth that does not affect the security of data transmitted.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: Periodontal diseases are one of the major dental pathologies that affect human populations worldwide at high prevalence rates The term periodontal disease usually refers only to plaque related inflammatory disease of the dental supporting tissues. Mouth rinses which act as an anti-plaque agents mostly used as adjuncts to oral hygiene. Aims of the study: To Estimate and compare the effects of Aloe vera relative to chlorhexidine on the clinical periodontal parameters (plaque index, gingival index, bleeding on probing). Material and method: A total of 44 subjects with plaque-induced gingivitis, baseline of data were collected for (PLI, GI, and BOP) and underwent oral hygiene instruction, scaling and polishing, then divided into:
... Show MoreThis investigation was carried out to estimate the antiparasitic potential of silver and Chitosan nanoparticles loaded with spiramycin against toxoplasmosis infected. After mice injected intraperitoneal in a dose 103viable tachyzoites for acute infection; then treated with spiramycin, chitosan nanoparticles and silver nanoparticles as a single or combined therapy given for seven days. Peritoneal fluid examination revealed a significant decrease in the number of
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreBackground and purpose: Animal model helps researchers to evaluate new treatment plan for human and understand pathological mechanism involved in a development of disease. The use of rats as an animal model for Alzheimer's research has become a favorite among researchers. Rats are capable in mimicking Alzheimer disease due to their intelligence and quick adaptation to nature. At present there are several methods that can be used to induce Alzheimer's animals, but each method has advantages and disadvantages. We need to learn other methods that can provide many advantages and few disadvantages. The Amyloid-beta 42 (Aβ-42) and Reactive Oxygen Species (ROS) are thought to play an important role in the pathology of Alzheimer’s disease. Th
... Show More