For the first time in this study, Zinc oxide nanoparticles were biosynthesized by the eco-friendly and cost-effective procedure using Amygdalus scoparia stem bark extract then used as antibacterial, antifungal, anticancer, and anti-diabetic agents. The characterization techniques confirmed the biosynthesis, crystalline nature, structure, size, elemental composition of ZnO NPs and bioactive compounds that exist in A. scoparia extract accounting for Zn2+ ion reduction, capping and stabilization of ZnO NPs. The ZnO NPs displayed remarkable inhibitory activity against E. coli, E. aerigenes, S. aureus, P. oryzae, F. thapsinum, and F. semitectum compared to antibiotic standards. The ZnO NPs showed significant inhibitory effects on cancer cell lines, while it had no toxic effect on Vero normal cell line. The ZnO NPs (30 mg/kg)-treated diabetic rats showed significantly higher levels of insulin and lower AST, ALT and blood glucose compared with the STZ induced diabetic group and other treated groups (P < 0.05). The ZnO NPs- and extract-treated rats showed significantly higher levels of IR, GluT2, and GCK expression and lower TNFα expression compared with the STZ induced diabetic rats. Our findings showed that ZnO NPs represented an outstanding performance for biological applications. 相似文献
On the basis of the energy supply and demand, this paper assesses the environmental damage from air pollution in Iran using the Extern-E study that has extended over 10 years and is still in progress in the European Union (EU) commission. Damage costs were transferred from Western European practice to the conditions of Iran by scaling according to GDP per capital measured in PPP terms. 相似文献
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods. 相似文献
Most of the commonly used hydrological models do not account for the actual evapotranspiration (ETa) as a key contributor to water loss in semi-arid/arid regions. In this study, the HEC-HMS (Hydrologic Engineering Center Hydrologic Modeling System) model was calibrated, modified, and its performance in simulating runoff resulting from short-duration rainfall events was evaluated. The model modifications included integrating spatially distributed ETa, calculated using the surface energy balance system (SEBS), into the model. Evaluating the model’s performance in simulating runoff showed that the default HEC-HMS model underestimated the runoff with root mean squared error (RMSE) of 0.14 m3/s (R2?=?0.92) while incorporating SEBS ETa into the model reduced RMSE to 0.01 m3/s (R2?=?0.99). The integration of HECHMS and SEBS resulted in smaller and more realistic latent heat flux estimates translated into a lower water loss rate and a higher magnitude of runoff simulated by the HECHMS model. The difference between runoff simulations using the default and modified model translated into an average of 95,000 m3 runoff per rainfall event (equal to seasonal water requirement of ten-hectare winter wheat) that could be planned and triggered for agricultural purposes, flood harvesting, and groundwater recharge in the region. The effect of ETa on the simulated runoff volume is expected to be more pronounced during high evaporative demand periods, longer rainfall events, and larger catchments. The outcome of this study signifies the importance of implementing accurate estimates of evapotranspiration into a hydrological model.
In this study, we investigated the validity of a stealth assessment of physics understanding in an educational game, as well as the effectiveness of different game-level delivery methods and various in-game supports on learning. Using a game called Physics Playground, we randomly assigned 263 ninth- to eleventh-grade students into four groups: adaptive, linear, free choice and no-treatment control. Each condition had access to the same in-game learning supports during gameplay. Results showed that: (a) the stealth assessment estimates of physics understanding were valid—significantly correlating with the external physics test scores; (b) there was no significant effect of game-level delivery method on students' learning; and (c) physics animations were the most effective (among eight supports tested) in predicting both learning outcome and in-game performance (e.g. number of game levels solved). We included student enjoyment, gender and ethnicity in our analyses as moderators to further investigate the research questions. 相似文献
In recent years, due to the drastic rise in the number of vehicles and the lack of sufficient infrastructure, traffic jams, air pollution, and fuel consumption have increased in cities.
The optimization of timing for traffic lights is one of the solutions for the mentioned problems. Many methods have been introduced to deal with these problems, including reinforcement learning. Although a great number of learning-based methods have been used in traffic signal control, they suffer from poor performance and slow learning convergence. In this paper, a transfer learning-based method for traffic signal control has been proposed. Multi-agent system has also been used for modelling the traffic network and transfer learning has been used to make reinforcement learning agents transfer their experience to each other. Furthermore, a classifier has been utilized to classify the transferred experiences. The results show that using the proposed method leads to a significant improvement on average delay time and convergence time of the learning process.
Nowadays malware is one of the serious problems in the modern societies. Although the signature based malicious code detection is the standard technique in all commercial antivirus softwares, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new malwares (unknown malwares). Since most of malwares have similar behavior, a behavior based method can detect unknown malwares. The behavior of a program can be represented by a set of called API's (application programming interface). Therefore, a classifier can be employed to construct a learning model with a set of programs' API calls. Finally, an intelligent malware detection system is developed to detect unknown malwares automatically. On the other hand, we have an appealing representation model to visualize the executable files structure which is control flow graph (CFG). This model represents another semantic aspect of programs. This paper presents a robust semantic based method to detect unknown malwares based on combination of a visualize model (CFG) and called API's. The main contribution of this paper is extracting CFG from programs and combining it with extracted API calls to have more information about executable files. This new representation model is called API-CFG. In addition, to have fast learning and classification process, the control flow graphs are converted to a set of feature vectors by a nice trick. Our approach is capable of classifying unseen benign and malicious code with high accuracy. The results show a statistically significant improvement over n-grams based detection method. 相似文献
Silicon - In this study, a new magnetic ZrFe2O4@SiO2-TCPP nanocatalyst with high efficiency was used for the oxidation of cyclohexane to cyclohexanone (Ke) and cyclohexanol (Al). The mesoporous... 相似文献
The hydrodynamics and mass transfer characteristics of a lab-scale jet bubbling reactor(JBR) including the gas holdup, volumetric mass transfer coefficient and specific interfacial area were assessed experimentally investigating the influence of temperature, p H and superficial gas velocity. The reactor diameter and height were 11 and 30 cm,respectively. It was equipped with a single sparger, operating at atmospheric pressure, 20 and 40℃, and two p H values of 3 and 6. The height of the liquid was 23 cm, while the superficial gas velocity changed within 0.010–0.040 m·s~(-1) range. Experiments were conducted with pure oxygen as the gas phase and saturated lime solution as the liquid phase. The liquid-side volumetric mass transfer coefficient was determined under unsteady-state oxygen absorption in a saturated lime solution. The gas holdup was calculated based on the liquid height change, while the specific interfacial area was obtained by a physical method based on the bubble size distribution(BSD) in different superficial gas velocities. The results indicated that at the same temperature but different p H, the gas holdup variation was negligible, while the liquid-side volumetric mass transfer coefficient at the p H value of 6 was higher than that at the p H = 3. At a constant p H but different temperatures, the gas holdup and the liquid-side volumetric mass transfer coefficients at 40℃ were higher than that of the same at 20℃. A reasonable and appropriate estimation of the liquid-side volumetric mass transfer coefficient(kla) in a pilot-scale JBR was provided which can be applied to the design and scale-up of JBRs. 相似文献