As result of exposure in low light-level are images with only a small number of
photons. Only the pixels in which arrive the photopulse have an intensity value
different from zero. This paper presents an easy and fast procedure for simulating
low light-level images by taking a standard well illuminated image as a reference.
The images so obtained are composed by a few illuminated pixels on a dark
background. When the number of illuminated pixels is less than 0.01% of the total
pixels number it is difficult to identify the original object.
Anxiety has become a highly paramount field of research attention in psychopharmacology today. Sundry studies have shown a nitric oxide role in the regulation of anxiety. The goal of the study was to investigate sodium nitroprusside ability to affect anxiety-like behavior in mice and to compare this effect with the standard anxiolytic drug, diazepam, using both plus maze test and light/dark box test. The results revealed that sodium nitroprusside at a dose of 1 mg/kg had a significant effect on the behavior in both of the elevated plus maze test and light/dark test. However, at higher dose (3 mg/kg), it has significantly increased the anxiogenic-like effect in the light/dark box test. Diazepam at a dose of 2 mg/kg increased the time spen
... Show MoreThe extrasolar planets in the vicinity of stars are expected to be bright enough
and are very difficult to be observed by direct detection. The problem is attributed to
the side loops of the star that created due to the telescope diffraction processing.
Several methods have been suggested in the literatures are being capable to detect
exoplanet at a separation angle of 4λ/D and at a contrast ratio of 10-10. These
methods are more than one parameter function and imposing limitations on the inner
working distance. New simple method based on a circular aperture combined with a
third power Gaussian function is suggested. The parameters of this function are then
optimized based on obtaining a minimum inner working dis
The article deals with the role of metaphors in forming the plot of L. Ulitskaya’s family chronicle “Medea and Her Children”. The author of the article describes the results of the next stage of research related to the works of Lyudmila Evgenievna Ulitskaya, a representative of modern Russian prose. The analysis of tropes and figures in the works written at the turn of the XXth – XXIth centuries is of importance for the study of the modern state of Russian language as an independent system. “Medea and Her Children” is one of the works by L. Ulitskaya (written in 1996), which, like her other works, is characterized by a unique style of narration, rich in vocabulary, lexical, semantic and stylistic diversity of the author’s word
... Show MoreBackground : Carpal tunnel syndrome (CTS) is the most common entrapment neuropathy of upper extremities and Open carpal tunnel release is the most frequent surgical procedure and the gold standard for cases that do not respond to conservative treatment. Aims :This study is used to evaluate the functional outcome of limited palmar mini-incision of carpal tunnel release. This study aims to determine the safety and symptomatic and functional efficacy of median nerve decompression with limited incision in carpal tunnel syndrome surgery. Patients and methods:Carpal tunnel release with a 1.5-2 cm limited palmar incision was performed on 20 patients. Patients were evaluated initially at one month after treatment according to symptom severity
... Show MoreTwo-dimensional electrical resistivity imaging and seismic refraction, in the form of down-hole survey, were applied to delineate the subsurface section and elastic moduli and identify geotechnical characteristics of subsurface materials in the 10th of Ramadan industrial area, Cairo, Egypt. The results of four 2-D profiles of electrical resistivity, in the form of dipole–dipole and Wenner configurations, revealed that the subsurface section contains two main geo-electrical layers; the first is made of sand, some silt, and gravels, reflecting low resistivity values ranging from 25 to 65.5 ohm m. This layer is overlying a high resistivity layer (65.5 to135 ohm m), corresponding to medium to coars
... Show MoreBackground: Tumor associated tissue eosinophilia (TATE) has been described in a variety of neoplasms. In regard to squamous cell carcinoma, some studies worldwide done to assess stromal eosinophilia in oral and cervical squamous cell carcinoma. The objectives of this study is to evaluate the association of stromal eosinophilic infiltration of cutaneous squamous cell carcinoma and to detect the significance of this association. Aim of the study The aim of our study is to establish the relationship between the degree of stromal eosinophilia and the level of invasion and the histological grade in cutaneous squamous cell carcinoma. Methods: In this retrospective study done at the histopathology department of al Wasity teaching hospital for orth
... Show MoreBackground: Tumor associated tissue eosinophilia (TATE) has been described in a variety of neoplasms. In regard to squamous cell carcinoma, some studies worldwide done to assess stromal eosinophilia in oral and cervical squamous cell carcinoma. The objectives of this study is to evaluate the association of stromal eosinophilic infiltration of cutaneous squamous cell carcinoma and to detect the significance of this association.
Aim of the study
The aim of our study is to establish the relationship between the degree of stromal eosinophilia and the level of invasion and the histological grade in cutaneous squamous cell carcinoma.
Methods: In this retrospective study
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThis paper deals with the subject of demarcating as appropriate scientific techniques to rationalize consumption and to control segments of the society for the technical conduct of its handling of the product depending on the mix of elements (product and the volume of demand, Price, promotion and distribution), but inverse manner designed to adjust the working condition of balance between supply and demand and to ensure that rates continue in the marketing process properly, and therefore the research aims to shed light on some of the practices that reflect the Demarketing techniques, As well as the statement of the reality of attitudes towards the practice of those techniques through a sample survey of officials in Baghdad company for so
... Show MoreIn this study, we derived the estimation for Reliability of the Exponential distribution based on the Bayesian approach. In the Bayesian approach, the parameter of the Exponential distribution is assumed to be random variable .We derived posterior distribution the parameter of the Exponential distribution under four types priors distributions for the scale parameter of the Exponential distribution is: Inverse Chi-square distribution, Inverted Gamma distribution, improper distribution, Non-informative distribution. And the estimators for Reliability is obtained using the two proposed loss function in this study which is based on the natural logarithm for Reliability function .We used simulation technique, to compare the
... Show More