In this study a new antiseptic was formulated and tested to match the effectiveness against microorganisms. The formulation consisted of Povidone - Iodine (PVP-I) (10%), H2O2 (3%) and Aloe Vera gel (pure). Different ratios of these materials were prepared within the acceptable range of pH for an antiseptic (3-6). The prepared samples were tested. The In Vitro test was performed by using four bacteria, two were Gram-Positive (Staphylococcus aureus and Bacillus cereus) and two were Gram-Negative (Escherichia coli and Pseudomonas aeruginosa). The new antiseptic showed 100% killing rate for E. coli, Ps. aeruginosa and S. aureus and 96.4667% killing rate for B. cereus. When the new antiseptic was compared with two common antiseptics (chloroxylenol (Dettol) and alcohol-based antiseptic), it was superior because the alcoholic antiseptic showed 100% killing rate for E. coli, Ps. aeruginosa and S. aureus and 89.8000% for B. cereus. The Dettol did not show killing rate against bacteria. Ex vivo test was carried out using the sample that showed the highest effectiveness in the In Vitro test. This was performed by applying the formulation on the skin of lab mice after wounding and contaminating the wounds with two bacteria (Staphylococcus aureus and Escherichia coli). After applying the antiseptic on the wounds, swabs from the wounds were taken for testing. The new antiseptic showed amazing efficacy against bacteria by leaving agar dish completely empty from bacteria. In vivo test was also conducted using the polymerase chain reaction (PCR) test for COVID-19. The new antiseptic did not show effectiveness against Coronavirus because the virus could not be isolated like bacteria.
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
In this paper, we investigate the connection between the hierarchical models and the power prior distribution in quantile regression (QReg). Under specific quantile, we develop an expression for the power parameter ( ) to calibrate the power prior distribution for quantile regression to a corresponding hierarchical model. In addition, we estimate the relation between the and the quantile level via hierarchical model. Our proposed methodology is illustrated with real data example.
The other day in the Holy Quran and the four Gospels
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThe research talks about the most important challenges facing Muslim youth of their ideological, social and economic types, and the youth is facing several problems, the most important of which are the intellectual and social invasion to which the Islamic nation has been exposed and ways to address them from a Quranic perspective and find solutions to these problems and these challenges in accordance with Islamic Sharia and the texts of the Holy Quran. From three topics and several demands, during which the researcher tried to find solutions to each challenge through the verses of the Noble Qur’an.
In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreOrthodontic wires facilitate the required dental adjustments in the context of orthodontic therapy. The archwire has played a crucial role in orthodontic treatment, and the increasing emphasis on aesthetic preferences from patients, as well as the development of composite and ceramic brackets, have prompted investigations into aesthetic archwires that complement these brackets. Orthodontic wires are produced using a diverse range of materials. The utilisation of all available wire types can improve patient comfort, decrease chairside time, and shorten the overall duration of treatment. The individual clinician must possess comprehensive knowledge and comprehension of the various requirements and alternatives throughout the therapeut
... Show MoreRutting has a significant impact on the pavements' performance. Rutting depth is often used as a parameter to assess the quality of pavements. The Asphalt Institute (AI) design method prescribes a maximum allowable rutting depth of 13mm, whereas the AASHTO design method stipulates a critical serviceability index of 2.5 which is equivalent to an average rutting depth of 15mm. In this research, static and repeated compression tests were performed to evaluate the permanent strain based on (1) the relationship between mix properties (asphalt content and type), and (2) testing temperature. The results indicated that the accumulated plastic strain was higher during the repeated load test than that during the static load tests. Notably, temperatur
... Show More