In this study, we set up and analyze a cancer growth model that integrates a chemotherapy drug with the impact of vitamins in boosting and strengthening the immune system. The aim of this study is to determine the minimal amount of treatment required to eliminate cancer, which will help to reduce harm to patients. It is assumed that vitamins come from organic foods and beverages. The chemotherapy drug is added to delay and eliminate tumor cell growth and division. To that end, we suggest the tumor-immune model, composed of the interaction of tumor and immune cells, which is composed of two ordinary differential equations. The model’s fundamental mathematical properties, such as positivity, boundedness, and equilibrium existence, are examined. The equilibrium points’ asymptotic stability is analyzed using linear stability. Then, global stability and persistence are investigated using the Lyapunov strategy. The occurrence of bifurcations of the model, such as of trans-critical or Hopf type, is also explored. Numerical simulations are used to verify the theoretical analysis. The Runge–Kutta method of fourth order is used in the simulation of the model. The analytical study and simulation findings show that the immune system is boosted by regular vitamin consumption, inhibiting the growth of tumor cells. Further, the chemotherapy drug contributes to the control of tumor cell progression. Vitamin intake and chemotherapy are treated both individually and in combination, and in all situations, the minimal level required to eliminate the cancer is determined.
The efficient behavior of a low-concentrating photovoltaic-thermal system with a micro-jet channel (LCPV/T-JET) and booster mirror reflector is experimentally evaluated here. Micro-jets promote the thermal management of PV solar cells by implementing jet water as active cooling, which is still in the early stages of development. The booster mirror reflector concentrates solar irradiance into solar cells and improves the thermal, electrical, and combined efficiencies of the LCPV/T-JET system. The LCPV/T-JET system was tested under ambient weather conditions in the city of Bangi, Selangor, Malaysia, and all data was recorded between 10:00 a.m. and 4:00 p.m. Parametric studies were conducted to compare the performance of the LCPV/T-JET system
... Show MoreGrass carp at a weight of 34.68 + 2 g were gradually exposed to four saline concentrations: tap water (0.1), 3, 6, 9, and 12 gm/litter, and the first concentration represented a control treatment. Fish were fed on a diet with a protein content of 30% for ten weeks. Results of the growth experiment showed that the feed conversion rate was 2.46, 3.58, 4.84, 6.77, and -8.56 in the first to fifth treatments, respectively, and the rate feed conversion efficiency was 40.65, 27. 93, 20.66, 14.77 and 11.68 %, while the protein intake was 22.38, 20.44, 18.86, 17.47 and 16.56 g in salt concentrations of 0.1, 3, 6, 9 and 12 g/L, respectively. In another experiment to study the effect of salt acc
By- products of corn starch industry were used to prepare media for propagation the lactic acid bacteria as a natural auxotroph. The by- products used were the corn steep water (S) and gluten extract (G) after a proper treatment to get them ready for media preparation. The results showed that it was possible to replace the peptone and meat extract by gluten extract in MRS medium. The growth was approximately similar to that obtained in standard MRS media. Corn steep water (S) was used as well and the growth enhanced by including Tween – 80 at 1% level. The later media named MZ, which was superior for growing standard and local strains and starters. The MZ medium modified by adding acetate and glacial acetic acid similarly to
... Show MoreMicrobiological contamination by fungi impacts the quality and safety of wheat grain storage. This study aimed to evaluate the efficacy of cold plasma in restricting the growth of the fungus, Aspergillus niger, which was isolated from wheat grains. A dielectric barrier discharge (DBD) operating at atmospheric pressure generated cold plasma that was used to treat the fungus, and the impact of this treatment was investigated at various periods 1, 2, 4, 6, and 15 minutes. The results revealed a highly significant decrease in the growth and number of spores of Aspergillus niger compared to the controls. This study revealed an efficient technique for enhancing wheat grain storage that could be a foundation for further large-scale studies.
... Show MoreThe aim of this research is to find out the influence of Daniel's model on the skills of the twenty-first century among the students of the scientific-fifth grade at the secondary and preparatory government morning schools for the academic year 2022- 2023. Two groups were chosen out of five groups for the fifth-scientific grade, one of which represents the experimental group that is taught by the Daniel model, and the other is the control group that is taught in the traditional method. The equivalence of the two research groups was verified with a set of variables. As for the research tool, a scale was developed by the researchers for the skills of the twenty-first century, in which they adopted the framework of the Partnership Organizat
... Show MoreThe two body model of (Core+n) within the radial wave functions of the cosh potential has been used to investigate the ground state features such as the proton, neutron and matter densities, the root mean square (RMS) nuclear proton, neutron, charge and mass radii of unstable neutron-rich 14B, 15C, 19C and 22N nuclei. The calculated results show that the two body model with the radial wave functions of the cosh potential succeeds in reproducing neutron halo in these nuclei.
The use of the Iraqi song in the symphony orchestra is one of the pioneering and important works, which carries with it an artistic value of aesthetic specificity in how to use the Iraqi singing heritage. The research aimed to identify the employment of the song (Foug Al-Nakhl) and its works within the Iraqi national symphony orchestra music by the author Hans Count Momer whose works still have a great influence on the authors of the Iraqi orchestra. The researcher presented a brief introduction to the Iraqi Symphony Orchestra, a brief introduction about the author, and the trends of world music towards heritage. He also talked about musical composition, research procedures and tools, and applying the tool to the selected sample (F
... Show MoreAbstract
The research aimed to prepare an audit program focusing on the activities of municipal institutions related to the environmental dimension as one of the dimensions of sustainable development, and applying the program for the purpose of preparing an oversight report related to assessing the impact of the activities of municipal institutions on the environmental reality as the main channel through which municipal institutions contribute to achieving the part related to it. Among the requirements of sustainable development, the proposed program was prepared and applied to the institutions affiliated to the Directorate of Mu
... Show MoreCan not reach a comprehensive concept for interior design through the use of Harmonization term according transformations experienced by the terms of the variables associated with the backlog of cultures that characterize concepts according to the nature of the users of the spaces in the design output, which necessitates the meaning of the combination of knowledge, art, science, such as the type of perceptions design the Harmonization cognitive science with art to create products of the use of design configurations that help the designer to put such a product within the reality and like the fact that reliable, as well as the rational knowledge tend somehow to the objective specifically in facilitating the substance subject to perceptible
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More