The aim of the study was extraction of arial part of Euphorbia cyathophora constituents with methanol and evaluate its effect on mitotic index and total chromosomal aberration bone marrow cell and spleen cell in mice 200 gm of E. cyathophora fine powder was defatted then extracted by cold maceration 80% ethanol for seven days. The extract was filtered and dried in a rotary evaporator then the dried extract was suspended with water and consecutively extracted using chloroform, ethyl acetate for each. The aqueous layer was then mixed with 100ml methanol. These fractions are dried under reduced pressure to obtain the dry extract. Twenty-four Albino mice were used for the experiment. The animals were divided into four groups: Group 1: Mice were treated with distilled water. The dose was given daily for seven successive days. Group 2: Mice were treated with a single dose (20mg/kg) of methotrexate (positive control). Group 3: Mice were treated with (100mg/kg) of menthol fraction for seven successive days. Group 4: Mice were treated with (200mg/kg) of methanol fraction for seven successive days. Mice were sacrificed by (spinal dislocation). Samples of bone marrow cells and spleen cells were taken and genotoxic analyses. Methanol fraction of Euphorbia cyathophora at a dose of 100mg/kg demonstrated a significant decrease in mitotic index and a significant increase in total chromosomal aberrations as compared to distilled water in both bone marrow cells and spleen cells (p<0.05). 100 mg/kg and 200 mg/kg of methanol fraction of Euphorbia cyathophora that showed to be significantly higher in mitotic index and significantly lower in total chromosomal aberration as compared to methotrexate (p<0.05). In conclusion the current study revealed that the methanol fraction of aerial parts of Euphorbia cyathophora is genotoxic but its genotoxicity is less than that of methotrexate.
Increasing need for our youth to effective dialogue at the present time, due to the nature of the era in which live, as it abounded risk of intellectual and cultural invasion.Moreover, the need to ensure that the dialogue between the members of the community to confront the many issues of contemporary society in various fields, politically, socially and economically, culturally and religiouslyThe absence of effective dialogue, or the consequent rejection of many of the negative aspects of social and cultural Kaezzlh coup and inertia and ignore the mental capacity of some non-existent among others.The importance of effective dialogue in being the most important foundations of social life a
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreThis paper includes a comparison between denoising techniques by using statistical approach, principal component analysis with local pixel grouping (PCA-LPG), this procedure is iterated second time to further improve the denoising performance, and other enhancement filters were used. Like adaptive Wiener low pass-filter to a grayscale image that has been degraded by constant power additive noise, based on statistics estimated from a local neighborhood of each pixel. Performs Median filter of the input noisy image, each output pixel contains the Median value in the M-by-N neighborhood around the corresponding pixel in the input image, Gaussian low pass-filter and Order-statistic filter also be used.
Experimental results shows LPG-
... Show MoreThe design, synthesis, and characterization of a star shaped 2,4,6-tris-(4`-carboxyphenoxy)-1,3,5-triazine liquid crystalline with columnar discotic mesophase properties establish H-bond interactions with 3,5-dialkoxypyidine were reported. The structures of the synthesized compounds were actually determined by elementary analysis, and FT-IR, ¹HNMR, ¹³CNMR, and mass spectroscopy. The mesomorphic properties of these mesogens were examined using differential scanning calorimetry (DSC) and optical polarizing microscopy (OPM). The synthesized molecules exhibited enantiotropic hexagonal columnar liquid crystal, which depends for the H- bond complex in a 1:3 ratio.
The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More