Complexes of Co(II),Ni(II),Cu(II)and Zn(II) with mixed ligand of 4 tributylphosphine (PBu3) were prepared in aqueous ethanol with (1:2:2) (M:L:PBu3)The prepared
Background: While two-thirds of breast cancers express hormone receptors for either estrogen (ER) and/or progesterone (PR) , genetically altered PI3K pathway was found in more than 70% of ER-positive breast cancers.An aberrant activity of cyclin-dependent kinase 1 (CDK1) in a wide variety of human cancers has selectively constituted an attractive pharmacological targets in MYC-dependent human breast cancer cells.
Aim of the study: Role of p110-beta as well as and CDK 1 in the pathogenesis of subset of breast cancers and contribution in their carcinogenesis.
Type of the study: is a retrospective study
Methods: This retr
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func
In this research the results of applying Artificial Neural Networks with modified activation function to perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of identification strategy consists of a feed-forward neural network with a modified activation function that operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have been trained online and offline have been used, without requiring any previous knowledge about the system to be identified. The activation function that is used in the hidden layer in FFNN is a modified version of the wavelet function. This approach ha
... Show MoreBinary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreThe investigation of determining solutions for the Diophantine equation over the Gaussian integer ring for the specific case of is discussed. The discussion includes various preliminary results later used to build the resolvent theory of the Diophantine equation studied. Our findings show the existence of infinitely many solutions. Since the analytical method used here is based on simple algebraic properties, it can be easily generalized to study the behavior and the conditions for the existence of solutions to other Diophantine equations, allowing a deeper understanding, even when no general solution is known.
Nowadays, datacenters become more complicated and handle many more users’ requests. Custom protocols are becoming more demanded, and an advanced load balancer to distribute the requests among servers is essential to serve the users quickly and efficiently. P4 introduced a new way to manipulate all packet headers. Therefore, by making use of the P4 ability to decapsulate the transport layer header, a new algorithm of load balancing is proposed. The algorithm has three main parts. First, a TCP/UDP separation is used to separate the flows based on the network layer information about the used protocol in the transport layer. Second, a flow size prediction technique is adopted, which re
... Show MoreFemtosecond laser pulse propagation in monomode optical fibers is demonstrated and investigated numerically (by simulations) and experimentally in this paper. A passively mode locked Nd:glass laser giving a pulse duration of about 200 fsec at 1053 nm wavelength and 120 mW average optical power with 100 MHz repetition rate is used in the experimental work. Numerical simulations are done by solving the nonlinear Schrödinger equation with the aid of Matlab program. The results show that self phase modulation (SPM) leads to compression of the spectral width from 5 nm to 2.1 nm after propagation of different optical powers (34, 43, 86 and 120 mW) in fibers of different length (5, 15, 35 m). The varying optical powers produced a varying
... Show More