Background: Hyperlipidemia is an elevated fat (lipids), mostly cholesterol and triglycerides, in the blood. These lipids usually bind to proteins to remain circulated so-called lipoprotein. Aims of the study: To determine taste detection threshold and estimate the trace elements (zinc) in serum and saliva of those patients and compare all of these with healthy control subjects. Methods: Eighty subjects were incorporated in this study, thy were divided into two groups: forty patients on simvastatin treatment age between (35-60) years, and forty healthy control of age range between (35-60) years. Saliva was collected by non-stimulated technique within 10 minutes. Serum was obtained from each subject. Zinc was estimated in serum and saliva by flame atomic absorption assay. Taste detection threshold was estimated by using 15 different concentrations of the four basic tastes solutions, the test use sip and spit with deionized water as mouth wash interval. Diabetics, thyroid and parathyroid disease, autoimmune disease, chemotherapy, smoking, alcoholics, neoplastic diseases were excluded. Results: The study showed that the taste detection threshold of sour and bitter were highly significantly higher in those patients than that in control subjects, sweet detection threshold were significantly high in patient on simvastatin. The salt detection threshold showed no significant differences between study groups. Salivary flow rate was significantly decreased in patients on simvastatin treatment than that in control subjects. Salivary and serum zinc were highly significantly decreased in control subjects than those in patients. There was highly significantly positive linear correlation between salivary flow rate and the mean of detection threshold of sweetness and sourness of both study groups, and highly significantly negative linear correlation with the mean of detection threshold of saltiness and bitterness in both study groups.
Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreThis paper present a simple and sensitive method for the determination of DL-Histidine using FIA-Chemiluminometric measurement resulted from oxidation of luminol molecule by hydrogen peroxide in alkaline medium in the presence of DL-Histidine. Using 70?l. sample linear plot with a coefficient of determination 95.79% for (5-60) mmol.L-1 while for a quadratic relation C.O.D = 96.44% for (5-80) mmol.L-1 and found that guadratic plot in more representative. Limit of detection was 31.93 ?g DL-Histidine (S/N = 3), repeatability of measurement was less that 5% (n=6). Positive and negative ion interferances was removed by using minicolume containing ion exchange resin located after injection valve position.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreMany approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
Lost circulation or losses in drilling fluid is one of the most important problems in the oil and gas industry, and it appeared at the beginning of this industry, which caused many problems during the drilling process, which may lead to closing the well and stopping the drilling process. The drilling muds are relatively expensive, especially the muds that contain oil-based mud or that contain special additives, so it is not economically beneficial to waste and lose these muds. The treatment of drilling fluid losses is also somewhat expensive as a result of the wasted time that it caused, as well as the high cost of materials used in the treatment such as heavy materials, cement, and others. The best way to deal with drilling fluid losses
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreBackground: One of the most predominant periodontal diseases is the plaque induced gingivitis. For the past 20 years, super-oxidized solutions have be..
Background: Recently, Poly propylene fibers with and without plasma treatment have been used to reinforce heat cure denture base acrylic but, so far some of properties like tensile strength , wettability and wear resistance not evaluated yet, the aim of the study is to clarify the influence of incorporation of treated and untreated fibers on these properties. Materials and methods: Twenty one specimens were fabricated for every tested property(tensile strength, wear resistance and wettability) that classified into three groups(control, untreated poly propylene fibers reinforced specimens and Oxygen plasma treated group)and for each test sevens amples were used(n=7). Tensile strength was tested using Instron universal testing machine, wear
... Show MoreBACKGROUND: The rapidly growing knowledge regarding factors controlling tumour growth, with the new modalities of therapy acting on the biological activity of the tumours draw the attention of most cancer researches nowadays and represent a major focus for clinical oncology practice. For the detection of HER2/neu protein overexpression and gene amplification, immunohistochemistry (IHC) and in-situ hybridisation (ISH) is the recommended techniques, respectively, with high concordance between the two techniques. The current United Kingdom recommendations for HER2/neu testing are either for a two-tier system using IHC with reflex ISH testing in equivocal positive cases, or a one-tier ISH strategy. AIM: To compare the results of HER2/neu gene s
... Show More