Demodex species are external parasites; they are transmitted via direct contact, and when present in elevated numbers it may induce several ocular diseases. However, the symptoms are very similar to other diseases; hence, its’ role is often neglected. Therefore, an accurate diagnosis is important in order to avoid mistreatment. In this study, infestation rates in both blepharitis and chalazia were compared to an asymptomatic group, with relation to gender, age, personal hygiene, time of year, and residency. All specimens were examined immediately after collection. The aim of this study was to investigate the relationship between Demodex mites and ocular diseases. These mites were predominantly found in patients with chalazia (62.50%) followed by blepharitis (58.91%), while they were only observed in (22.64%) of asymptomatic patients, statistical analysis showed a significant relationship between infestation and both ocular diseases (P<0.01). The infestation rates increased significantly with age reaching (100%) in patients above 70 years old, and especially during cold months with high humidity. These mites were also found in rural areas (57.59%), followed by urban areas (44.09%) and a significant relationship was found between residency and infestation rate (P≤0.05). However, no significant relationship was found according to gender nor personal hygiene.
Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
In this work, we consider a modification of the Lotka-Volterra food chain model of three species, each of them is growing logistically. We found that the model has eight equilibrium points, four of them always exist, while the rest exist under certain conditions. In terms of stability, we found that the system has five unstable equilibrium points, while the rest points are locally asymptotically stable under certain satisfying conditions. Finally, we provide an example to support the theoretical results.
Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
This paper deals with constructing a model of fuzzy linear programming with application on fuels product of Dura- refinery , which consist of seven products that have direct effect ondaily consumption . After Building the model which consist of objective function represents the selling prices ofthe products and fuzzy productions constraints and fuzzy demand constraints addition to production requirements constraints , we used program of ( WIN QSB ) to find the optimal solution
In this paper, new concepts which are called: left derivations and generalized left derivations in nearrings have been defined. Furthermore, the commutativity of the 3-prime near-ring which involves some
algebraic identities on generalized left derivation has been studied.
The continuous growth in technology and technological devices has led to the development of machines to help ease various human-related activities. For instance, irrespective of the importance of information on the Steam platform, buyers or players still get little information related to the application. This is not encouraging despite the importance of information in this current globalization era. Therefore, it is necessary to develop an attractive and interactive application that allows users to ask questions and get answers, such as a chatbot, which can be implemented on Discord social media. Artificial Intelligence is a technique that allows machines to think and be able to make their own decisions. This research showed that the dis
... Show MoreIn this paper ,we introduce hollow modules with respect to an arbitrary submodule .Let M be a non-zero module and T be a submodule of M .We say that M is aT-hollow module if every proper submodule K of M such that T ⊈ K is a T-small submodule of M .We investigate the basic properties of a T-hollow module
In previous our research, the concepts of visible submodules and fully visible modules were introduced, and then these two concepts were fuzzified to fuzzy visible submodules and fully fuzzy. The main goal of this paper is to study the relationships between fully fuzzy visible modules and some types of fuzzy modules such as semiprime, prime, quasi, divisible, F-regular, quasi injective, and duo fuzzy modules, where under certain conditions it has been proven that each fully fuzzy visible module is fuzzy duo. In addition, there are many various properties and important results obtained through this research, which have been illustrated. Also, fuzzy Artinian modules and fuzzy fully stable modules have been introduced, and we study the rel
... Show MoreIn this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets