Culex quinquefasciatus is an intermediate host of several human pathogens and serve as a vector of filariasis worldwide. Recently, there are increasing efforts to develop new and effective nanoparticles to control mosquito vectors. The green synthesis of ZnO-CuO nanoporous composite using Gum Arabic (Acacia senegalensis) was successfully carried out with Gum Arabic and the composite was characterized by UV-Visible, FTIR, and SEM/EDX techniques. Three different larval instars (1st, 2nd, and 3rd) of Culex quinquefasciatus were exposed to various concentrations (10, 20, 25 mg/l) of the ZnO-CuO nanocomposite for 24 h. The LC50 values for the 1st, 2nd, and 3rd instars were found to be 4.702, 5.459, and 5.459, respectively, while the LC90 values were 22.923, 33.922, and 33.922, respectively. The correlation coefficient values for the three instars were found to be 0.982, 0.941, and 0.941, respectively, and these indicate concentration-dependent larvicidal activity. The novel ZnO-CuO nanoporous composite could serve as a new nanolarvicide against the filariasis-transmitting vector.
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreBuilding a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show MoreGlaucoma is a visual disorder, which is one of the significant driving reason for visual impairment. Glaucoma leads to frustrate the visual information transmission to the brain. Dissimilar to other eye illness such as myopia and cataracts. The impact of glaucoma can’t be cured; The Disc Damage Likelihood Scale (DDLS) can be used to assess the Glaucoma. The proposed methodology suggested simple method to extract Neuroretinal rim (NRM) region then dividing the region into four sectors after that calculate the width for each sector and select the minimum value to use it in DDLS factor. The feature was fed to the SVM classification algorithm, the DDLS successfully classified Glaucoma d
Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C
... Show MoreIn this study, the feasibility of Forward–Reverse osmosis processes was investigated for treating the oily wastewater. The first stage was applied forward osmosis process to recover pure water from oily wastewater. Sodium chloride (NaCl) and magnesium chloride (MgCl2) salts were used as draw solutions and the membrane that was used in forward osmosis (FO) process was cellulose triacetate (CTA) membrane. The operating parameters studied were: draw solution concentrations (0.25 – 0.75 M), oil concentration in feed solution (FS) (100-1000 ppm), the temperature of FS and draw solution (DS) (30 - 45 °C), pH of FS (4-10) and the flow rate of both DS and FS (20 - 60 l/h). It was found that the water flux and oil concentration in FS increas
... Show MoreIn this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.
The rotation effect upon Morse potential had been studied and the values of the effective potential in potential curves had been calculated for electronic states (X2?+g , B ?u ) K2 molecule. The calculation had been computed for rotational quantum number (J = 5). Also, drawing potential curves for these systems had been done using Herzberg and Gaydon equations. It was found that the values of the dissociation energy which resulting from using Herzberg equation greater than that of Gaydon equation. Besides, it was found that the rotation effect for (X and B) electronic states in Morse potential is very small and in this case may negligible.
The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreThe aim of this paper, is to discuss several high performance training algorithms fall into two main categories. The first category uses heuristic techniques, which were developed from an analysis of the performance of the standard gradient descent algorithm. The second category of fast algorithms uses standard numerical optimization techniques such as: quasi-Newton . Other aim is to solve the drawbacks related with these training algorithms and propose an efficient training algorithm for FFNN
Feature selection represents one of the critical processes in machine learning (ML). The fundamental aim of the problem of feature selection is to maintain performance accuracy while reducing the dimension of feature selection. Different approaches were created for classifying the datasets. In a range of optimization problems, swarming techniques produced better outcomes. At the same time, hybrid algorithms have gotten a lot of attention recently when it comes to solving optimization problems. As a result, this study provides a thorough assessment of the literature on feature selection problems using hybrid swarm algorithms that have been developed over time (2018-2021). Lastly, when compared with current feature selection procedu
... Show More