In this paper a prey-predator model involving Holling type IV functional response
and intra-specific competition is proposed and analyzed. The local stability analysis of
the system is carried out. The occurrence of a simple Hopf bifurcation is investigated.
The global dynamics of the system is investigated with the help of the Lyapunov
function and poincare-bendixson theorem. Finally, the numerical simulation is used to
study the global dynamical behavior of the system. It is observed that, the system has
either stable point or periodic dynamics.
في هذا البحث تم تحضير المركبات المعدنية النانوية الجديدة لأيونات البلاتين 4+و الذهب 3+ مع ليكاند قاعدة مانخ جديد مشتق من السيبروفلوكساسين بطريقة الموجات فوق الصوتية. تم تشخيص المعقدات النانوية والليكاند الجديد بأستخدام تقنيات فيزيائية و كيميائية مختلفة مثل أطياف الاشعة تحت الحمراء، حيود الاشعة السينية ، المجهر الالكتروني الماسح ، المجهر الالكتروني النافذ و مجهر القوة الذرية. تم تحديد نشاط مضادات الأك
... Show MoreBackground: Cytokines have long been implicated in the pathogenesis of autoimmune diabetes in a number of studies, and playing a role in the initiation of β-cell damaging process. The objective of this study is to gain more understanding about the role of cytokines in initiation of T1DM, through assessment of IFN-γ, IL-10 and IL-6 in diabetic patients.
Patients and methods: A total of 60 patients who were newly diagnosed as having T1DM (diagnosed less than five months) were included in the present study. Fifty apparently healthy control subjects were underwent the measurement of serum IFN-γ, IL-10 and IL-6 by ELISA.
Results: Higher serum levels of IFN-γ, IL-10, and Il-6 were observed in the investigated
Helicobacter pylori (H. pylori) is one of the most common human pathogens in the world. Several studies that have investigated the correlation between H. pylori infection and type 2 diabetes mellitus (DM) found that H. pylori infection is more frequent in the patients, while the results of other studies were unclear. This paper aims to investigate the interrelation between the infection with H. pylori and type 2 DM in Dohuk governorate, Iraq. Eighty four diabetes patients (41 males, 43 females) and 92 healthy controls were involved in this study. H. pylori status was assessed in serum samples by using ELISA test. Out of the 84 patients,
... Show MoreDrug hypersensitivity involves the activation of T cells in an HLA allele–restricted manner. Because the majority of individuals who carry HLA risk alleles do not develop hypersensitivity, other parameters must control development of the drug-specific T cell response. Thus, we have used a T cell–priming assay and nitroso sulfamethoxazole (SMX-NO) as a model Ag to investigate the activation of specific TCR Vβ subtypes, the impact of programmed death -1 (PD-1), CTL-associated protein 4 (CTLA4), and T cell Ig and mucin domain protein-3 (TIM-3) coinhibitory signaling on activation of naive and memory T cells, and the ability of regulatory T cells (Tregs) to prevent responses. An expa
A study on solvent extraction of Tellurium with Anthranilic acid in
water has been made. The effect of different parameters such as type of medium, time of equilibration, concentration of metal ion, solvent polarity and effect of anions and catins distribution ratio of tellrim (IV) were evaluated. The stoichometric ratio of the extracted species is determined by using two methods suh as slope analysis and mole ratio method and found to be (M: L) (1:4). The instability constant of complex was calculated as well.
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreAuthentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi
In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction acc
... Show More. In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction a
... Show More