ABSTRACT : Alzheimer’s disease (AD) is one of the most common inflammatory neurodegenerative diseases linked with dementia, it is characterized by the deposition of amyloid beta-peptide (Ab) in the brain. The present study aims to innovate a biochemical relationship between AD and interleukin 38 (IL-38) as an anti-inflammatory cytokine, expose novel mechanisms and concepts regarding other biochemical parameters studied previously or recently in AD patients and also examine the biochemical action of memantine (10 mg daily) on AD patients. Sixty (60) diagnosed AD patients participated in the present study and classified into four (4) groups: G3 were composed of (15) newly diagnosed males (52-78) years / without treatment, G4 composed of (15) newly diagnosed females (64-90) years/ without treatment, G5 composed of (15) males (60-85) years / under treatment with memantine and G6 composed of (15) females (65-73) years also under treatment with memantine. Patients were compared with healthy subjects as two control groups: G1 composed of (15) males /(52-80) years and G2 composed of (15) females / (64-82) years. Blood samples were collected from the patients and control subjects from November 20th, 2019 to February 26th, 2020. The biochemical parameters determined in the sera of all groups are Interleukin 38, ornithine, and TSH. Results of the present study have revealed that IL-38 level was highly significantly increased in G3 and G4 compared with G1 and G2 respectively while it was highly significant increased in G5 compared with G3 and non significantly increased in G6 compared with G4, the difference between (G5 and G1) and between (G6 and G2) was highly significant while the difference between G4 and G3 was nonsignificant. Ornithine level was highly significantly increased in G3 and G4 compared with G1 and G2 respectively, while it was non significantly decreased in G5 and G6 compared with G3 and G4, respectively. The difference between (G5 and G1) and between (G6 and G2) was highly significant while it was non-significant between G4 and G3. TSH level was highly significant decreased in G3 compared with G1, while it was non significantly decreased in G4 compared with G2. However, it was highly significantly increased in G5 and G6 compared with G3 and G4, respectively, the difference between (G5 and G1) and between (G4 and G3) was nonsignificant while, it was highly significant between (G6 and G2). The present study is the first to report that IL-38 is a novel biochemical marker for AD and also the first elucidating the biochemical action of memantine on IL-38 (by highlighting the anti-inflammatory responses) and ornithine based on the reversible biochemical relationship between arginine, ornithine and glutamate.
In this study, Titanium Dioxide Nanoparticles were synthesized by an easy and eco-friendly technique (green synthesis) using green tea leaves (Camillia sinensis), Nanoparticles were analyzed using structural and optical analysis, the X-ray pattern showed that Titanium Dioxide NPs had a tetragonal structure with (Face Centered Tetragonal) FCT crystal structure, the UV-visible recorded an absorbance peak near 350 nm and calculated energy band gap was 3.5 eV, all measurements were proved the purity and Nano size of prepared Nanoparticles. Biochemical parameters evaluation also mentioned in this research, these analyzes showed that Titanium Dioxide nanoparticles in particular dose (50 mg/kg) have the ability to reduce blood glucose
... Show MoreDiabetic Nephropathy(DN) is a complex disease manifested by persistence microalbuminuria occurring due to the interaction between hemodynamic and metabolic pathway that activates the local renin-angiotensin-aldosterone system resulting in a decline in renal functions.
This study aimed to quantify the associations between serum aldosterone concentration and fetuin- A as a marker of calcification in type 2 diabetic patients with and without microalbuminuria from one side, and study the possible relationship between aldosterone and fetuin-A with glycemic indices, serum electrolyte, renal function and microalbuminuria and body mass index from the other side.
A case-control study involved eighty-six adult subjects
... Show MoreGod Almighty put in his great book secrets that do not end, and wonders that do not expire, for he is the one from which the scholars are not satisfied, and he does not create due to the multitude of response, and it is the comprehensive and inhibitory book that God conceals to the worlds, and he challenged the two heavyweights to come up with something like it.
At all times, issues arise in the Noble Qur’an that fit the needs of the people of that time and their culture, for it is an eternal book, characterized by the ability to give, extend and respond to addressing the problems of the age and its variables, when the Arabs had little luck at the time of the message’s descent from the scientific culture, and their proficienc
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More