Contracting cancer typically induces a state of terror among the individuals who are affected. Exploring how chemotherapy and anxiety work together to affect the speed at which cancer cells multiply and the immune system’s response model is necessary to come up with ways to stop the spread of cancer. This paper proposes a mathematical model to investigate the impact of psychological scare and chemotherapy on the interaction of cancer and immunity. The proposed model is accurately described. The focus of the model’s dynamic analysis is to identify the potential equilibrium locations. According to the analysis, it is possible to establish three equilibrium positions. The stability analysis reveals that all equilibrium points consistently exhibit stability under the defined conditions. The bifurcations occurring at the equilibrium sites are derived. Specifically, we obtained transcritical, pitchfork, and saddle-node bifurcation. Numerical simulations are employed to validate the theoretical study and ascertain the minimum therapy dosage necessary for eradicating cancer in the presence of psychological distress, thereby mitigating harm to patients. Fear could be a significant contributor to the spread of tumors and weakness of immune functionality.
In this paper, an Integral Backstepping Controller (IBC) is designed and optimized for full control, of rotational and translational dynamics, of an unmanned Quadcopter (QC). Before designing the controller, a mathematical model for the QC is developed in a form appropriate for the IBC design. Due to the underactuated property of the QC, it is possible to control the QC Cartesian positions (X, Y, and Z) and the yaw angle through ordering the desired values for them. As for the pitch and roll angles, they are generated by the position controllers. Backstepping Controller (BC) is a practical nonlinear control scheme based on Lyapunov design approach, which can, therefore, guarantee the convergence of the position tracking
... Show MoreThis research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo
... Show MoreIn this paper fractional Maxwell fluid equation has been solved. The solution is in the Mettag-Leffler form. For the corresponding solutions for ordinary Maxwell fluid are obtained as limiting case of general solutions. Finally, the effects of different parameters on the velocity and shear stress profile are analyzed through plotting the velocity and shear stress profile.
In the present work, the critical micelle concentration (CMC) of the solution of Sodium dodecyl sulfate (SDS) as anionic surfactant, Cocamidopropyl Betaine (CAPB) as amphoteric surfactant, and their mixture have been determined using surface tension and conductivity measurements at a temperature range 293 -323 K. The adsorption and thermodynamic micellization parameters (?G?m, ?G?ads, ?max ,Amin,?cmc ) for individual surfactants was calculated. Rosen model which is focuses on the adsorbed mixed surfactant film at the air/solution interface was used to calculate the interaction parameter ( ?? ) at the interface and the activity coefficients g1 and g2. The results indicate that the CMC of the individual surfactants was affected by
... Show MoreOne of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed
... Show MoreThis research which is entitled (Devine Beauty), aims at studying the philosophical and literary extensive visions of Andalusian poets in search of pleasure in the beauty of divine self and its impact on the formation of a philosophical frame of mind. It also attempts to investigate the aesthetic aspects that highlight the prestige and greatness and majesty of that absolute beauty.
The most important conclusion of the reach is the Bany Ahmar poets use the beauty of women and the pleasure of wine as cods to reach divine beauty and get the happiness desired with the reflection of absolute beauty in a clear philosophy and thinking of the kingdom of God Almighty.
This study was designed to show the roles of vitamin D as immune-modulatory agent in serum type II Diabetes Mellitus Patients collected from type II Diabetes Mellitus and controls. They have been classified into two groups as the following: 1) Patients of type II DM group includes (20) individuals from both sexes with age range (35–65) years. 2) Control group: includes (20) healthy individuals from both sexes, with age range (30 – 45) years and no previous disease which may interfere with the parameters analyzed in this research. All the blood samples were analyzed for vitamin D3, albumin, C- reactive protein (CRP), erythrocyte sedimentation rate (ESR), immunoglobulins (IgG, IgM, IgA), α1- antitrypsin and to
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreBackground: Orthodontic tooth movement is characterized by tissue reactions, which consist of an inflammatory response in periodontal ligament and followed by bone remodeling in the periodontium depending on the forces applied. These processes trigger the secretion of various proteins and enzymes into the saliva.The purpose of this study was to evaluate the activity of alkaline phosphatase (ALP) in saliva during orthodontic tooth movement using different magnitude of continuous orthodontic forces. Materials and Methods: Thirty orthodontic patients (12 males and 18 females) aged 17-23 years with class II division I malocclusion all requiring bilateral maxillary first premolar extractions were randomly divided into three groups according to t
... Show More