Despite efforts to contain and manage the SARS-CoV-2 outbreak which was declared a public health emergency of international concern in January 2020 by the World Health Organization (WHO), the COVID-19 pandemic still remains a major global challenge. Patients who display the classical symptoms of the infection are easily identified, tested, isolated and monitored. However, many cases of infected asymptomatic patients have been documented. These patients are not easily identified even though many evidences suggest that they can spread the virus to others. How and why these COVID-19 asymptomatic presentations occur remain unclear. The many theories and views are conjectural, and supporting evidences are still needed. In this review, we described the trend in SARS-CoV-2 viral shedding and susceptibility, providing perspectives on gender differences and asymptomatic patients. We further discussed how genetics, gender, viral inoculum, and pre-existing immunity may influence asymptomatic presentations in COVID-19 infections. We hope that this article improves our understanding of asymptomatic SAR-CoV-2 infection and it sheds light on some salient areas that should be considered as the search for a potent vaccine continues.
This paper focuses on the optimization of drilling parameters by utilizing “Taguchi method” to obtain the minimum surface roughness. Nine drilling experiments were performed on Al 5050 alloy using high speed steel twist drills. Three drilling parameters (feed rates, cutting speeds, and cutting tools) were used as control factors, and L9 (33) “orthogonal array” was specified for the experimental trials. Signal to Noise (S/N) Ratio and “Analysis of Variance” (ANOVA) were utilized to set the optimum control factors which minimized the surface roughness. The results were tested with the aid of statistical software package MINITAB-17. After the experimental trails, the tool diameter was found as the most important facto
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThe global health crisis resulting from the spread of the Corona virus, which the World Health Organization described on January 30, 2020 as a public health emergency of international concern, then returned to describe it as a pandemic on March 11, 2020, and the measures and procedures taken by government authorities in different countries of the world, whether at the highest level of imposing a comprehensive curfew or what is called globally home quarantine and thus disrupting all sectors and activities in the state, whether public or private (with the exception of some sectors such as the health, media and security sectors), or at a lower level than that, such as reducing work rates in different sectors by rates that vary from one country
... Show MoreKefir is fermented milk made from kefir grains consist mainly of lactic acid bacteria and yeast, it has several health-promoting properties, such as antimicrobial ,antitumoral, and immunomodulating effects. However, there are few scientific reports about the effects of kefir on parasites. This work, studied the biological activity of kefir fermented against Entamoeba histolytica parasite in mice at concentration (100% and 50%) compared with the metronidazole (flagyl) drug at concentration (30 mg\ml). The results showed that infected mice treated with kefir(100% and 50%) complete the eradication of parasite after (6th and 8th day) respectively post inoculation while in metronidazole treated group the complete the eradication occur after (
... Show MoreIn this paper, the solar attraction effect on the Moon orbital elements had been studied. The solar attraction considered a third body perturbation. The initial values of the Moon orbital elements at 2015-1-21.5 which are used (semi major axis=380963.78 km, eccentricity =0.056o, Eular angles (Ω=30°, ω=40°, , i=18.4°). The Moon in a perigee of its orbit at the initial time. A program which designed, was used to calculate the Moon position ,velocity and orbital elements through the years (2015-2035). The position and velocity components of the Moon were calculated by solving the equation of Kepler for elliptical orbit using Newton Raphson's method for (1000) periods and hundred steps of time for each period. The results show a secular
... Show More
... Show MoreThe interests toward developing accurate automatic face emotion recognition methodologies are growing vastly, and it is still one of an ever growing research field in the region of computer vision, artificial intelligent and automation. However, there is a challenge to build an automated system which equals human ability to recognize facial emotion because of the lack of an effective facial feature descriptor and the difficulty of choosing proper classification method. In this paper, a geometric based feature vector has been proposed. For the classification purpose, three different types of classification methods are tested: statistical, artificial neural network (NN) and Support Vector Machine (SVM). A modified K-Means clustering algorithm
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show More