The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.
Citric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the
... Show MoreIn recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show MoreAbstract The present study aimed to investigate the morphological description and histological structure of thyroid gland in Herpestes javanicus . The results revealed that thyroid gland in adult Herpestes javanicus is located in the neck region just below the larynx and attached to the trachea . Histological study revealed that thyroid gland in H. javanicus surrounded by a capsule of losse connective tissue and the thyroid gland mainly formed from follicles within different sizes. The results showed that the follicle consists of three compenets represented by follicular lining cells, basal parafollicular cells and the colloid. Microscopical examination revealed that the follicular lining tissue is either to be simple squamous or simple cub
... Show MoreIn this study the new azo compounds (3compounds) for nitrogen bases (Adenine and Cytosine) are synthesized through two reaction steps (formation of diazonium salt and coupling reaction). The compounds have been characterized by FTIR, melting point, and ultra-violate (UV) spectra. All synthesized compounds have been estimated in vitro for their antimicrobial activities against two species of bacteria(E.coli, S.aureus)and one kind of fungi ( Aspergillus flavus) .The results show that these compounds have very good antibacterial and antifungal activities especially compounds 1 and 3.To study the effect of these compounds were making some physiological tests on rats are made ,the results of hematological study showed decreasing level of
... Show MoreBreast cancer is the second most common cancer in women world. Multiple Cytokines appear to have a dominant role in human breast cancer formation. Estimation of the in situ expression of IL-6 and IL-1β in breast cancer patients. A sixty patients with breast cancer BC were divided into two clinical subgroups, (30) with malignant breast cancer MBC and (30) with benign breast tumor as a control group according to histological examination. In situ hybridization technique used for detection of IL-6 and IL-1β mRNA sequence in two groups. The results showed that percentages of mRNA expression of IL-6 and IL-1β were in (≥ 11-50%) for malignant breast cancer. This research also investigated that (73.3%) of beni
... Show MoreYoung people represent the power and cornerstone of societies and their superiority is linked to their well-being. Their empowerment is as essential as the heart to the body, if it is corrupt, then the whole body is corrupt, and vice versa. The exposure to extremism and pressure from their families leads to violent acts and crimes for obtaining money through unknown organized bodies. This will drive them to fail in their life in an attempt to fulfill their most basic needs, which they have been deprived of by their families, the government, and other institutions. Therefore, governments should provide job opportunities for young people and provide entertainment centers, sports clubs, and family education centers that raise awareness of s
... Show MoreThis paper deals with modelling and control of Euler-Bernoulli smart beam interacting with a fluid medium. Several distributed piezo-patches (actuators and/or sensors) are bonded on the surface of the target beam. To model the vibrating beam properly, the effect of the piezo-patches and the hydrodynamic loads should be taken into account carefully. The partial differential equation PDE for the target oscillating beam is derived considering the piezo-actuators as input controls. Fluid forces are decomposed into two components: 1) hydrodynamic forces due to the beam oscillations, and 2) external (disturbance) hydrodynamic loads independent of beam motion. Then the PDE is discretized usi
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More