The objective of this study is to evaluate the level of cytokines IL-1?, IL-10 and IL-17A in the serum of patients with Alzheimer's disease (AD), vascular dementia (VD) and down syndrome (DS). The results showed that Serum level of IL-1? was significantly increased in AD patients (3.79 ± 0.26 pg/ml) as compared with DS patients (2.78 ± 0.39 pg/ml) or controls (2.78 ± 0.22 pg/ml), while no significant difference was observed between AD and VD (3.25 ± 0.20 pg/ml) patients or between VD patients, DS patients and controls. The serum level of IL-10 was approximated in VD and DS patients and controls (3.39 ± 0.24, 2.77 ± 0.39 and 3.41 ± 0.35 pg/ml, respectively), but was significantly (P ? 0.05) increased in AD patients (5.73 ± 0.55 pg/ml
... Show MoreIn this study, a cholera model with asymptomatic carriers was examined. A Holling type-II functional response function was used to describe disease transmission. For analyzing the dynamical behavior of cholera disease, a fractional-order model was developed. First, the positivity and boundedness of the system's solutions were established. The local stability of the equilibrium points was also analyzed. Second, a Lyapunov function was used to construct the global asymptotic stability of the system for both endemic and disease-free equilibrium points. Finally, numerical simulations and sensitivity analysis were carried out using matlab software to demonstrate the accuracy and validate the obtained results.
The goal of this discussion is to study the twigged of pure-small (pr-small) sub- moduleof a module W as recirculation of a small sub-module, and we give some basic idiosyncrasy and instances of this kind of sub-module. Also, we give the acquaint of pure radical of a module W (pr-radical) with peculiarities.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreShiranish formation has been divided into two microfacies units: 1-Marly biowacke stone facies 2-Biogenic pack stone facies These microfacies reflected marine deep shelf margin in the upper part of the formation, the lower part was deeper. 238 slides were investigated depending on Mineralogical, compositional and Biological processes, which reflect deep shelf margin at upper part of the formation, but at the lower part open sea environment. The age of the formation is estimated depending on the recognized biostratigraphic zone using the index fossils to be Upper- Middle Maestrichtian.
In this work the strain energy of tetrahedrane and its nitrogen substituted molecules were calculated by isodesmic reaction method according to DFT quantum chemical fashion, the used basis set was 6-31G/B3-LYP, in addition all structures were optimized by RM1 semi-empirical method. From the obtained data we estimate an empirical equation connect between strain energy of the molecule with charge functions represented by dipole moment of the molecule plus accumulated charge density involved within the tetrahedron frame plus the number of nitrogen atoms. The results indicate the charge spreading factors by polarization and processes are the most important factors in decreasing the strain energy.
This paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b
... Show More