In this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.
The current study focuses on the bacterium Acinetobacter baumannii due to its importance as a nosocomial infections source in addition to its increased resistance against antibiotics. Different clinical and hospital environment samples were collected, and cultured on A. baumannii selective media: Leed Acinetobacter agar and Herellea agar. A. baumannii have been identified by traditional methods, followed by confirmation using molecular identification to detect blaoxa-51 like gene which is considered a diagnostic gene since it is present in genome of all A. baumannii strains. The result was, nineteen bacterial isolates of A.baumannii were obtained, from twenty-seven suspected isolate
... Show MoreBackground: Obesity is a worldwide challenge and is closely
connected to many metabolic diseases. Two types of
adipose tissue, white adipose tissue (WAT) and brown
adipose tissue (BAT) have been identified. White fat cells
store chemical energy, brown adipocytes defend against
hypothermia, obesity and diabetes.
Objective: To localize and quantify brown adipocytes in
human subcutaneous (S) and visceral (V) adipose tissue by
histology and immunohistochemistry.
Type of the study: A cross –sectional study.
Methods: Adipose tissue was obtained from histopathology
specimens taken from ten patients, of different age, sex and
body mass index (BMI), undergoing surgery for different
pathologies
This study is designed to isolate and molecular identification of C. gattii, C. gattii is pathogenic yeast and effect immunocomposed and immunocompetent, Methods: collect 50 samples from eucalyptus leaves. The collection time was extended from November 2021 to February 2022 and then culture at SDA, Cryptococcus Differential Agar esculin agar and Eucalyptus leaves agar, Brain heart infusion agar with methyldopa and Brain heart infusion agar with methyldopa media, biochemical test including urease test, and then confirm identification by molecular identification by PCR technique sequencing and genetic analysis. The results showed that 4 swaps taken from eucalyptus leaves included cryptococcus neoformans. This study indicated that the virulenc
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreA new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments