In this paper, the packing problem for complete ( 4)-arcs in is partially solved. The minimum and the maximum sizes of complete ( 4)-arcs in are obtained. The idea that has been used to do this classification is based on using the algorithm introduced in Section 3 in this paper. Also, this paper establishes the connection between the projective geometry in terms of a complete ( , 4)-arc in and the algebraic characteristics of a plane quartic curve over the field represented by the number of its rational points and inflexion points. In addition, some sizes of complete ( 6)-arcs in the projective plane of order thirteen are established, namely for = 53, 54, 55, 56.
Background Direct-acting antivirals (DAAs) combination therapies from various mechanisms of action and families have been revolutionized the management landscape of chronic hepatitis C virus (HCV). Ombitasvir, paritaprevir with ritonavir (OBV/PTV/r) ± ribavirin (RBV) is approved to treat HCV genotype 4 (GT4) infection. Here, our objective was to delineate the efficacy and safety of OBV/PTV/r plus RBV in treating of Egyptian naïve patients infected with HCV GT4.
Methods a cohort of 100 Egyptian patients infected with HCV GT4 was allocated and administered orally OBV/PTV/r with RBV. The primary endpoint of our study was a sustained virological response (HCV RNA < 12 IU/mL) 12 weeks after the c
... Show MoreTwo molecular imprinted polymer (MIP) membranes for Levofloxacin (LEV) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of styrene (STY) as monomer, N,N methylene di acrylamide as a cross linker ,benzoyl peroxide (BPO) as an initiator and levofloxacin as a template. Di methyl adepate (DMA) and acetophenone (AOPH) were used as plasticizers , the molecular imprinted membranes and the non molecular imprinted membranes were prepared. The slopes and detection limits of the liquid electrodes ranged from -21.96 – -19.38 mV/decade and 2×10-4M- 4×10-4M, and Its response time was around 1 minute, respectively. The liquid electrodes were packed with 0.1 M standar
... Show MoreNewly 4-amino-1,2,4-triazole-3-thione ring 2 was formed at position six of 2-methylphenol from the reaction of 6-(5-thio1,3,4-oxadiazol-2-yl)-2-methylphenol 1 with hydrazine hydrochloride in the presence of anhydrase sodium acetate. Seven newly fused heterocyclic compounds were synthesized from compound 2. First fused heterocyclic was 6-(6-(3,5-di-tertbutyl-4-hydroxyphenyl)-[1,2,4]triazolo[3,4-b][1,3,4]thiadiazol-3-yl)-2-methylphenol 3 synthesized from reaction compound 2 with 3,5-di-tert-butyl-4-hydroxybenzoic acid in POCl3. Reaction compound 2 with bromophencylbromide afford 6-(6-(4-bromophenyl)-5H-[1,2,4]triazolo[3,4-b][1,3,4]-thiadiazin-3-yl)-2-methylphenol 4. 6-(6-thio-1,7a-dihydro-[1,2,4] triazolo[3,4-b][1,3,4]-thiadiazol-3-yl)-2
... Show MoreNatural Bauxite (BXT) mineral clay was modified with a cationic surfactant (hexadecy ltrimethy lammonium bromide (BXT-HDTMA)) and characterized with different techniques: FTIR spectroscopy, X-ray powder diffraction (XRD) and scanning electron microscopy (SEM). The modified and natural bauxite (BXT) were used as adsorbents for the adsorption of 4- Chlorophenol (4-CP) from aqueous solutions. The adsorption study was carried out at different conditions and parameters: contact time, pH value, adsorbent dosage and ionic strength. The adsorption kinetic (described by a pseudo-first order and a pseudo-second order), equilibrium experimental data (analyzed by Langmuir, Freundlich and Temkin isotherm models) and thermodynamic parameters (change in s
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, WB Al-Zoubaidi, Our Dermatology Online/Nasza Dermatologia Online, 2015 - Cited by 10
The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreThis paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More