This in vivo study was conducted to investigate the effect of different concentrations of ozonated water on experimentally skin infection with some of bacterial isolates (Pseudomonas aeruginosa and Staphylococcus aureus ) which Showed dermal infection in experimental animals after 48 hours of exposure to these Microorganisms. Results revealed that ozone has the power to accelerated the healing process depending on the perfect concentration of ozonated water used and the severity of infection & nature of causative agent , in which the recovering period was 7 days for the infection caused by P. aeruginosa and 5 day for S.aureus by using the concentration 60 µg/ml . Results also indicated in this study the stimulated effect of Ozonated water on the immune system For the healthy mice at the concentration 20µg/ml through increasing in Phagocytic index ,Arthus and Delayed Type- Hypersensitivity reaction in addition to the inhibited effect of this material on this immunological Markers when the animals treated with Ozonated water at the concentration 60µg/ml . Different respond appear with the immune system For injured and infected mice when treated with ozonated water depending on the Kind of causing agent and the severity of infection .
The aim of the research is to determine the impact of profit management practices on the quality of profits through the use of flexibility in determining accounting methods and practices profit information is one of the most important information that concerns current users in general and observing users in particular. Some corporations managements manipulate the results of the company's profit or loss (income statement) and financial position statement with multiple reasons, including capital market motivations to raise their share prices in the stock market and attract investors, and on the other hand the motives of funding and borrowing loans, and the use of the flexibility in accounting policies and estimates to change the in
... Show MorePhotonic Crystal Fiber (PCF) based on the Surface Plasmon Resonance (SPR) effect has been proposed to detect polluted water samples. The sensing characteristics are illustrated using the finite element method. The right hole of the right side of PCF core has been coated with chemically stable gold material to achieve the practical sensing approach. The performance parameter of the proposed sensor is investigated in terms of wavelength sensitivity, amplitude sensitivity, sensor resolution, and linearity of the resonant wavelength with the variation of refractive index of analyte. In the sensing range of 1.33 to 1.3624, maximum sensitivities of 1360.2 nm ∕ RIU and 184 RIU−1 are achieved with the high sensor resolutions of 7
... Show MoreVehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreIn this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.