Background: Arterial stiffness is related with atherosclerosis and cardiovascular disease events. Patients with atherosclerotic disease show to have larger diameters, reduced arterial compliance and lower flow velocities. Aim of study : To compare between patients of two age groups with concomitant diseases diabetes and hypertension in regard to intima media thickness and blood flow characteristics in order to estimate the blood perfusion to the brain via the common and internal carotid arteries. Subject and Methods : 40 patients with (diabetic and hypertension) diseases were enrolled , they were classified according to age. Color Doppler and B mode ultrasound was used to determine lumen Diameter (D), Intima – media thickness (IMT), end diastolic velocity (EDV), peak systolic velocity (PSV), Resistive Index (RI), Pulsatility Index (PI), and the flow rate indices were calibrated and calculated . Results:- Results show that the change in the lumen diameter between the old patients group and the younger group were (2.02%) with insignificant (p value >0.05), and the difference in the in intima-media (IMT) thickness between the two age groups (35- 55) and (56-75) are (33.8%) with significant (p value <0.05). The change difference in peak systolic velocity was (-13.29% ) with insignificant (p value >0.05), while the difference in the (EDV) between both age groups was (-38.02%), with significant p value <0.05. Pressure gradient and flow rate have given insignificant difference between both age groups. Conclusion: The intima media is significantly thicker for the old age group than in the younger group. The increased thickness of intima media did not influence the lumen diameter significantly. A clear change in PSV, EDV, RI, and PI was observed which have influenced blood perfusion to the brain.
The cheif aim of the present investigation is to develop Leslie Gower type three species food chain model with prey refuge. The intra-specific competition among the predators is considered in the proposed model. Besides the logistic growth rate for the prey species, Sokol Howell functional response for predation is chosen for our model formulation. The behaviour of the model system thoroughly analyses near the biologically significant equilibria. The linear stability analysis of the equilibria is carried out in order to examine the response of the system. The present model system experiences Hopf bifurcation depending on the choice of suitable model parameters. Extensive numerical simulation reveals the validity of the proposed model.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThe concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
The South Baghdad electrical station located on the eastern bank of the Tigris River south of Baghdad city was selected within the municipality of Karrada between two latitude ( 330 15 , 33 0 18 )North and longitude ( 44 0 27 , 44 030 ) East . The purpose of the study is to determine the contribution of the station to the effect of pollution of the Tigris water by taking water samples at the station site and two sites, one before and the other after the station, distributed over time periods of three months between each sample of water and the beginning of August and November Shabat and Mayar and analyzed water samples physically, chemically and biologic
... Show MoreThe direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More