In this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for
... Show MoreIn this work the concept of semi-generalized regular topological space was introduced and studied via semi generalized open sets. Many properties and results was investigated and studied, also it was shown that the quotient space of semi-generalized regular topological space is not, in general semi-generalizedspace.
By use the notions pre-g-closedness and pre-g-openness we have generalized a class of separation axioms in topological spaces. In particular, we presented in this paper new types of regulαrities, which we named ρgregulαrity and Sρgregulαrity. Many results and properties of both types have been investigated and have illustrated by examples.
In this study, an easy, low-cost, green, and environmentally
friendlier reagents have been used to prepare CdS QDs, in chemical
reaction method by mixed different ratio of CdO and sulfur in
paraffin liquid as solvent and oleic acid as the reacting media in
different concentration to get the optimum condition of the reaction
to formation CdS QDs. The results give an indication that the
behavior is at small concentration of 4ml of the oleic acid is best
concentration which give CdS QDs of small about to 9.23 nm with
nano fiber configuration.
A New Spectrophotometric Methods are improved for determination Metronidazole (MTZ) and Metronidazolebenzoate (MTZB) depending on1STand 2nd derivative spectrum of the two drugs by using ethanol as a solvent. Many techniques were proportionated with concentration (peak high to base line, peak to peak and peak area). The linearity of the methodsranged between(1-25µg.ml-1) is obtained. The results were precise and accurate throw RSD% were between (0.041-0.751%) and (0.0331-0.452%), Rec% values between (97.78, 101.87%) and (98.033-102.39%) while the LOD between (0.051-0.231 µg.ml-1) and (0.074-1.04 µg.ml-1) and LOQ between (0.170-0.770µg.ml-1) and (0.074-0.313 µg.ml-1) of (MTZ) and of (MTZB) respectively. These Methods were successfully ap
... Show Morentroduction. Finding a safe innate immune response stimulator is one of the greatest challenges facing immunologists and vaccine manufacturers. Gap statement. The role of sterile bacterial secretions (SBSs) of Pseudomonas aeruginosa in stimulating the innate immune response was not investigated previously. Aim. The comparative effect of SBSs and bacterial cells of P. aeruginosa isolates isolated from freshwater (PAE) and infected wounds (PAC) on the respiratory tract innate immune response. Methodology. Four test mice groups were instilled intranasally (i.n.) with 106 c.f.u of PAC, 106 c.f.u of PAE, SBS of PAC, and SBS of PAE. Two control groups were given i.n. either LB broth or PBS. Time-course changes in IL-1 beta mRNA, TNF-alpha mRNA, I
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreFolic acid and multivitamin tablets containing Aspergillus flavus Penicillia spp. and Cladosporia spores were prepared at a compression pressure of 148 MN/m2 and stored at 35°C under different relative humidifies (75,85, and 95)% within air tight containers, to study the effect of storage condition on them, as well as ,the estimation of the microbial level of the raw materials intended to be used in the two kinds of tablets . Result showed that some raw materials derived from natural origin were heavily contaminated with microorganism compared to that of synthetic origin ,the results also indicated the effect of relative humidity , types of fungal spore , and the hygroscopic nature of exicpient upon survival. Multivit
... Show More