The present study aims to give some details about the normal anatomical and histological structure of the liver, pancreas and gall bladder in Cyprinus carpio Linnaeus, 1758 and Mesopotamichthys sharpeyi (Günther, 1874). Anatomical results revealed that the liver of C. carpio is a reddish-brown in color, located in the anterior part of abdominal cavity and dispersed between most of the intestines, which is divided into two lobes; while in M. sharpeyi the liver is light brown in color located in the anterior part of abdominal cavity and extends to the end of the intestinal tract with two lobs. The gallbladder situated in the right side of the liver in both species. Histological results in both species showed that the liver consists of hepatocytes arranged radially around a central vein, separated by blood sinusoids, not divided into distinct hexagonal lobules, no portal traids as in higher vertebrates. The wall of gallbladder consist of three distinct layers: Tunica mucosa, tunica muscularis and tunica serosa. Microscopic results showed that exocrine pancreatic tissue was diffused type in both species located in liver and consists of acini as "hepatopancreas ", however, pancreatic tissue diffused between the intestinal coiling in C. carpio, and in the internal surface of the liver in M. sharpeyi. Endocrine parts of pancreas were observed in few numbers of cell masses in various sizes among exocrine pancreatic cells.
This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreLaryngoscopy and tracheal intubation are considered the most invasive stimuli in anesthesia. They provoked cardiovascular responses that include hypertension, tachycardia and dysrhythmias. Various pharmacological approaches have been used to blunt or attenuate such pressor responses. The present study was designed to evaluate the effect of medazolom, lignocaine and propranolol as a valuable adjuvant to fentanyl in attenuating hemodynamic responses to endotracheal intubation in normotensive patients. Thirty two patient with physical status I or II according to the score of American Society of Anesthesiologist (ASA), scheduled for elective surgery under standard general anesthesia, were randomly allocated into four groups (8 patients in ea
... Show MoreBackground: Alveolar ridge expansion is proposed when the alveolar crest thickness is ≤5 mm. The screw expansion technique has been utilized for many years to expand narrow alveolar ridges. Recently, the osseodensification technique has been suggested as a reliable technique to expand narrow alveolar ridges with effective width gain and as little surgical operating time as possible. The current study aimed to compare osseodensification and screw expansion in terms of clinical width gain and operating time. Materials and methods: Forty implant osteotomies were performed in deficient horizontal alveolar ridges (3–5 mm). A total of 19 patients aged 21–59 years were randomized into two groups: the screw expansion group, which invo
... Show MoreThere are many diseases that affect the arteries, especially those related to their elasticity and stiffness, and they can be guessed by estimating and calculating the modulus of elasticity. Hence, the accurate calculation of the elastic modulus leads to an accurate assessment of these diseases, especially in their early stages, which can contribute to the treatment of these diseases early. Most of the calculations used the one-dimensional (1D) modulus of elasticity. From a mechanical point of view, the stresses to which the artery is subjected are not one-dimensional, but three-dimensional. Therefore, estimating at least a two-dimensional (2D) modulus of elasticity will necessarily be more accurate. To the knowledge of researchers, there i
... Show MorePower-electronic converters are essential elements for the effective interconnection of renewable energy sources to the power grid, as well as to include energy storage units, vehicle charging stations, microgrids, etc. Converter models that provide an accurate representation of their wideband operation and interconnection with other active and passive grid components and systems are necessary for reliable steady state and transient analyses during normal or abnormal grid operating conditions. This paper introduces two Laplace domain-based approaches to model buck and boost DC-DC converters for electromagnetic transient studies. The first approach is an analytical one, where the converter is represented by a two-port admittance model via mo
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More