The experiment was conducted to investigate the effect of prey type (Artemia nauplii, mosquito larvae and paramecium) on some reproductive aspects in crustacean zooplankton M. albidus which included reproductive period, post reproductive period, period spend to egg appearance and the period from appearance of egg to nauplii releasing. Results revealed that females fed on mosquito larvae had the highest mean of postreproductive period and lowest mean of the period spend to egg appearance, which differed significantly (P < 0.05) compared with the means of females who fed on Artemia nauplii and paramecium on the other hand the differences were not significant in reproductive period and the period from appearance of egg to nauplii releasing.
Moisture damage is described as a reduction in stiffness and strength durability in asphalt mixtures due to moisture. This study investigated the influence of adding nano silica (NS) to the Asphalt on the moisture susceptibility of hot-mix-asphalt (HMA) mixtures under different aging conditions. NS was mixed with asphalt binder at concentrations of 2%, 4%, and 6% by weight of the binder. To detect the microstructure changes of modified Asphalt and estimate the dispersion of NS within the Asphalt, the field emission scanning electron microscope (FE-SEM) was used. To examine the performance of Asphalt mixed with NS at different aging stages (short-term and long-term aging), asphalt mixture tests such as Marshall stability,
... Show MoreBackground: Adipose derived-mesenchymal stem cells have been used as an alternative to bone marrow cells in this study. Objective: We investigated the in vitro isolation, identification, and differentiation of stem cells into neuron cells, in order to produce neuron cells via cell culture, which would be useful in nerve injury treatment. Method: Mouse adipose mesenchymal stem cells were dissected from the abdominal subcutaneous region. Neural differentiation was induced using β-mercaptoethanol. This study included two different neural stage markers, i.e. nestin and neurofilament light-chain, to detect immature and mature neurons, respectively. Results: The immunocytochemistry results showed that the use of β-mercaptoethanol resulted in
... Show MoreAqueous extract of poppy plant) Papaver nudicaule) with five concentrations (50, 100, 150, 200 and 250) mg/l were used to anesthetize fingerlings of the common carp Cyprinus carpio (Mean total length 8.91 ± 0.31 cm and mean total weight 7.72 ± 1.19 gm) instead of the traditional use of MS-222. Results showed that extracted solution of poppy have partial and overall anesthesia effect on these fishes with inverse relationship between the concentrations used and the time needed to reach partial and overall anesthesia, and also direct relationship between concentrations used and time needed for fish recovery. Best results were obtained by using a concentration of 250 mg/l, where time for partial anesthesia was 8 ± 1.52 m
... Show MoreHigh-volume traffic with ultra-heavy axle loads combined with extremely hot weather conditions increases the propagation of rutting in flexible pavement road networks. Several studies suggested using nanomaterials in asphalt modification to delay the deterioration of asphalt pavement. The current work aims to improve the resistance of hot mix asphalt (HMA) to rutting by incorporating Nano Silica (NS) in specific concentrations. NS was blended into asphalt mixtures in concentrations of 2, 4, and 6% by weight of the binder. The behavior of asphalt mixtures subjected to aging was investigated at different stages (short-term and long-term aging). The performance characteristics of the asphalt mixtures were evaluated using the Marshall s
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More