Eight patients (3 male and 5 female) were treated in this study by Endovenous Laser Ablation (EVLA); Mathematical models are proposed to estimate the applied laser power and to assess the recovery period. The estimations of the applied laser power and recovery period in these models will be depended mainly on the diameter of the incompetent vein. In addition, Excel Program was utilized to find the proposed models. A 1470 nm diode laser up to 15W continuous power (CW) was used in the treatment of venous ulcers by EVLA procedure. Following up by duplex ultrasound was started in the 1st week after the first session until the vein is completely closed. The present study concluded that the relationship both between the applied laser power and recovery period with diameter is directly linear. The mathematical results obtained from the two mathematical proposals are consistent with the clinical results
This research sought to present a concept of cross-sectional data models, A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the
... Show MoreThe problem of Multicollinearity is one of the most common problems, which deal to a large extent with the internal correlation between explanatory variables. This problem is especially Appear in economics and applied research, The problem of Multicollinearity has a negative effect on the regression model, such as oversized variance degree and estimation of parameters that are unstable when we use the Least Square Method ( OLS), Therefore, other methods were used to estimate the parameters of the negative binomial model, including the estimated Ridge Regression Method and the Liu type estimator, The negative binomial regression model is a nonline
... Show MoreWe are, today, facing a torrent of information, ideas, images and videos due to advances of communication technology and electronic publishing. In addition to the proliferation of social networking sites that allow individuals to use them and participate in their channels without any restrictions limiting their freedom in publishing. Due to these sites many terms have emerged like alternative media which use internet and its various techniques to serve its objectives notably the freedom of expression without restrictions. This research studies the phenomenon of interactive media i.e. alternative media through Facebook along with the freedom that makes it spreading in the society and the relation of individual freedom with social diversit
... Show MoreA solid Phase Extraction (SPE) cartridges followed by HPLC-UV method is described for the simultaneous quantitative determination of benzidine (BZ) and its substituted 3, 3’-dichlorobenzidine (DCB) and 3, 3’-Dimethylbenzidine (DMB). The Benzidines were separated by liquid chromatography using a C-18 column with UV detector at wave length of 280nm. The mode of Flow was isocratic. The mobile phase was consisted of 75:25 methanol: water, column temperature 50C°, and Flow Rate 1.8ml/min. Calibration curves were linear (R2 = 0.9979-0.9995). LOD (26.36-33.67) µg/L, LOQ (109.98-186.11) µg/L, the Robustness (2.99-4.35), Ruggedness (2.93-3.65).Conditions of extraction by (SPE) cartridges were optimized, the resin used is Octadecyl silica (ODS
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreBy- products of corn starch industry were used to prepare media for propagation the lactic acid bacteria as a natural auxotroph. The by- products used were the corn steep water (S) and gluten extract (G) after a proper treatment to get them ready for media preparation. The results showed that it was possible to replace the peptone and meat extract by gluten extract in MRS medium. The growth was approximately similar to that obtained in standard MRS media. Corn steep water (S) was used as well and the growth enhanced by including Tween – 80 at 1% level. The later media named MZ, which was superior for growing standard and local strains and starters. The MZ medium modified by adding acetate and glacial acetic acid similarly to
... Show More