he aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail B. truncatus was more susceptible to leaves than stems extracts. The Molluscicidal activity of C. melo extractsdepended on increase of extract concentrations and time of exposure (p>0.05) (2) (PDF) Schistosomiasis vector control using cucumis melo plantextractswithbioassayexperiment. Available from: https://www.researchgate.net/publication/326097198_Schistosomiasis_vector_control_using_cucumis_melo_plantextractswithbioassayexperiment [accessed Apr 08 2023].
In this article, the research presents a general overview of deep learning-based AVSS (audio-visual source separation) systems. AVSS has achieved exceptional results in a number of areas, including decreasing noise levels, boosting speech recognition, and improving audio quality. The advantages and disadvantages of each deep learning model are discussed throughout the research as it reviews various current experiments on AVSS. The TCD TIMIT dataset (which contains top-notch audio and video recordings created especially for speech recognition tasks) and the Voxceleb dataset (a sizable collection of brief audio-visual clips with human speech) are just a couple of the useful datasets summarized in the paper that can be used to test A
... Show MoreA low-cost, RGB LED-based visible-light spectrophotometer was designed to measure dyes concentration. Dyes are widely used as indicators or coloring agents in different applications and knowing their concentration is an essential part for many studies. The proposed spectrophotometer provides many functionalities that clones the traditional expensive spectrophotometers for a budged price under $50. It was aimed to provide a versatile tool for instructors and educators to teach their students the fundamental concepts behind spectrophotometry. Malachite green, methyl red, and methyl orange dyes were chosen to be good samples to show the integrity of the proposed spectrophotometer in terms of accuracy, repeatability, and sensitivity as
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreCutaneous leishmaniasis is a disease caused by Leishmania tropica parasite. Current treatments for this parasite are undesirable because of their toxicity, resistance, and high cost. Macrophages are key players against pathogens. Nitric oxide (NO), a molecule produce by immune cells, controls intracellular killing of pathogens during infection. Silver nanoparticles (Ag NPs) demonstrated broad-spectrum activity against various types of infectious diseases. It has the ability to stimulate oxygen species production. This study aims to analyze the macrophages activation through NO production and estimate the cytotoxicity based on the lactate dehydrogenase (LDH) release upon exposure to L. tropica and
... Show MoreA mixture of algae biomass (Chrysophyta, Cyanophyta, and Chlorophyte) has been investigated for its possible adsorption removal of cationic dyes (methylene blue, MB). Effect of pH (1-8), biosorbent dosage (0.2-2 g/100ml), agitated speed (100-300), particle size (1304-89μm), temperature (20-40˚C), initial dye concentration (20-300 mg/L), and sorption–desorption were investigated to assess the algal-dye sorption mechanism. Different pre-treatments, alkali, protonation, and CaCl2 have been experienced in order to enhance the adsorption capacity as well as the stability of the algal biomass. Equilibrium isotherm data were analyzed using Langmuir, Freundlich, and Temkin models. The maximum dye-sorption capacity was 26.65 mg/g at pH= 5, 25
... Show MoreWe propose a new object tracking model for two degrees of freedom mechanism. Our model uses a reverse projection from a camera plane to a world plane. Here, the model takes advantage of optic flow technique by re-projecting the flow vectors from the image space into world space. A pan-tilt (PT) mounting system is used to verify the performance of our model and maintain the tracked object within a region of interest (ROI). This system contains two servo motors to enable a webcam rotating along PT axes. The PT rotation angles are estimated based on a rigid transformation of the the optic flow vectors in which an idealized translation matrix followed by two rotational matrices around PT axes are used. Our model was tested and evaluated
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More