The current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based
... Show MoreIntestinal mucositis is referring to inflammatory or ulcerative lesions of the oral or gastrointestinal tract; one of the main reasons is treatment with cancer chemotherapy. The prodrug Irinotecan is converted by carboxylesterase to the active metabolite SN-38, conjugated by UGT enzyme to SN-38G and then deconjugated by ?-glucoronidase produced by intestinal bacterial flora to produce SN-38. Irinotecan induces intestinal mucositis and diarrhea due to increased concentration of its active metabolite (SN-38).To evaluate the protective effect of carvone, I.P injection of (75mg/kg/day) of irinotecan for 4 days to induce intestinal mucositis, carvone administered to mice orally for 6 days starting from day 1. Results showed that carvone (50mg
... Show MoreBackground: The role of cytokines in cancer immunity and carcinogenesis in general has been well established, which play an important role in the pathogenesis of many solid cancers.This study aimed to estimate serum levels of IL-2 and IL-4, and to shed light on the correlation of these interleukins with progression of breast cancer.
Patients and Methods: The study included 80 women, it comprised of 45 breast cancer patients, 12 patients with benign breast lesions and 23 apparently healthy controls. ELISA method has been used for estimation the level of IL-2 and IL-4 in serum of three studied groups.
Results: This study showed elevation of IL-4 level in the sera of breast cancer patients with significant dif
Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreSynthesis, characterization and application of hierarchical zeolites are becoming a subject of an increasing interest among scientists and researchers. Hierarchical structures incorporating zeolites possess secondary porosity at meso- and macrolevel to overcome problem of mass transport, which occurs with using conventional zeolites.
In this study, the porous carbon surface was prepared by carbonization of the locally available agricultural waste of the Iraqi Nut shell (NS) using a carbonization method in a tubular furnace at 900ËšC for two hours. Hierarchicalpours structures including zeolite were prepared by the mechanical activation of the carbon surface using ultrasonication with a nanoparticles suspensio
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More