Tuaimah GS, AQ Al-Awadi, Ahmed ME., Effect of Cutibacterium acnes cell free antigen (CFAg) immunization, levofloxacin and cinnamon oil on Cutibacterium acnes infection in rabbits, Onl J Vet Res., 22 (9):811-822, 2018. C. acnes causes acne vulgaris most commonly in 12-24 year olds. Five albino rabbits were immunized at day 1 and 14 with Cutibacterium acnes cell free antigen (CFAg) and then infected intradermally with 0.1 ml C. acnes suspension (2×108 cfu/ml) at day 30. Two groups of five infected rabbits were then treated at Day 30 with 0.5% levofloxacin or 0.2% cinnamon oil twice daily for 12 days. Five control rabbits were infected intradermally with 0.1 ml 2×108 cfu/ml Cutibacterium acnes n (2×108 cfu/ml). At day 42, skin test (mm), serum IgG and IFN-γ were determined. In vitro, we found C. acnes minimum inhibitory concentrations for cinnamon oil 2mg/ml and levofloxacin 1.5 μg/ml, but resistant to clindamycin, azithromycin, erythromycin and metronidazole. Compared with controls, immunized rabbits showed significant increases in skin thickness (P < 0.01), serum IgG (P < 0.05) and IFN-γ levels (P < 0.01) and less pathology. In rabbits treated with cinnamon oil or levofloxacin we observed least pathology compared with other treatments. Results suggest that immunization with C. acnes CFAgs enhanced immunity and reduced lesions, and levofloxacin and cinnamon oil, may control acne.
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThe purpose of this paper is to give the definition of projective 3-space PG(3,q) over Galois field GF(q), q = pm for some prime number p and some integer m.
Also, the definition of the plane in PG(3,q) is given and state the principle of duality.
Moreover some theorems in PG(3,q) are proved.
Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor
... Show MoreRaw satellite images are considered high in resolution, especially multispectral images captured by remote sensing satellites. Hence, choosing the suitable compression technique for such images should be carefully considered, especially on-board small satellites, due to the limited resources. This paper presents an overview and classification of the major and state-of-the-art compression techniques utilized in most space missions launched during the last few decades, such as the Discrete Cosine Transform (DCT) and the Discrete Wavelet Transform (DWT)-based compression techniques. The pros and cons of the onboard compression methods are presented, giving their specifications and showing the differences among them to provide uni
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreIntrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S
... Show More