Nowadays nanoparticles have widespread application in various industriesbecause of their special and unique features, there are many studies in sideeffects of nanomaterial. This study done by 40 white female mice withevery other day intraperitoneally injection of low and high doses of both ofZnO kg of body weight) and FeOnanoparticles (5 and 40 mg/kg). After a 15 days period, the mice weresacrificed and blood samples were collected for hormone analysis, andtissue samples for morphometric studies.Statistical Analysis shows significant differences in LH, Estrogen,Progesterone hormone levels between groups, while there are insignificantdifferences in Follicle stimulating hormone (FSH) level between thegroups compared with its level in the control group.The results also show that the highest level of LH reach 7.2 mIU/ml in thegroups treated with low dose of zinc oxide, the highest level of FSH reach4.58 mIU/ml in the groups treated with low dose of zinc oxide, the highestlevel of Estrogen hormone reach 69.5 ng/ml in the groups treated with lowof dose zinc oxide and the highest level of Progesterone reach 1.9 ng/ml inthe groups treated with high dose iron oxide. We conclude from the resultsthat the low doses of ZnO has benefits in increasing fertility through highlevel of reproductive hormones, while the high levels of nanoparticlesreduce fertility and there is a relation between FeO nanoparticles andprogesterone levels which may need more future studies.Morphometric study of the ovary show increase in Follicular stagesnumber range in the group treated with Low dose ZnO in compare with itsrange in the control groups. The lower range was belong to the grouptreated with the high dose of FeO. No significant differences has beenfound in the diameter mean of the different follicular phases between thegroup treated with low dose of ZnO NPs in compared with the controlgroup. High dose of ZnO NPs cause significant increase in the diametermean of Primordial follicles in compared with the control group. Low andhigh dose FeO NPs treated groups show significant reduction in thediameter mean of the different follicular phases in compared with thecontrol group.
In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o