Background: Cancer is a lethal disease that results from a multifactorial process. Progression into carcinogenesis and an abnormal cell proliferation can occur due to the micro and macro environment as well as genetic mutations and modifications. In this review, cancer and the microbiota – mainly bacteria that inhabit the tumour tissue – have been discussed. The positive and negative impacts of the commensal bacteria on tumours being protective or carcinogenic agents, respectively, and their strategies have also been described. Methods: Related published articles written in English language were searched from Google Scholar, PubMed, Mendeley suggestions, as well as Google search using a combination of the keywords ‘Microbiota, commensal bacteria, cancer, tumor’. Relevant literature published between the years 1979 and 2018 were included in this review. Results: The complicated nature of cancer as well as the role that might be played by the commensal bacteria in affected tissues have been the focus of the recent studies. The symbiotic relationships between the microbiota and the host have been shown to confer benefits to the last. By contrast, the microbiota has been suggested to upgrade cancer by modifying the balance of host cell proliferation and death, by provoking chronic inflammation, and by eliciting uncontrolled innate and adaptive immunity. In this context, aerobic and anaerobic bacteria have been isolated from various tumor samples. Conclusions: It can be concluded that commensal microbiota plays an important role in the prevention of diseases including cancer. Inversely, microbiota alterations (dysbiosis) have been found to interrupt that symbiotic correlation between the host and the inhabitant microbiota probably leading to cancer. Recommendations: The correlation between the commensal microbiome, antibiotics uptake and cancer occurrence need to be investigated exclusively. Moreover, increased attention must be paid to evaluating the effects of these microorganisms on the currently used anticancer agents, and the role that might be played by commensal bacteria on tumor progression or tumor regression.
This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program uses th
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show More