Photobiomodulation (PBM) is a form of the use of visible red and Near-infrared (NIR) light at low power, where a laser light photon is absorbed at the electronic level, without heat production. PBM can be applied in wide range of treatment to help the wound, inflammation, edema, and pain reduction. However, there is a lack of scientific documentation regarding its actual effects. Objectives: This study assesses the impact of PBM on the release of M1-related cytokine in monocyte cells with particular emphasis on interleukin-1β (IL-1β) and Tumour Necrosis Factor α (TNF-α). Methods: Tamm-Horsfall Protein 1 (THP-1) macrophages M1 cells have been exposed to the light from the diode laser of 850nmat different doses (0, 0.6, 1.2 and 3.6 J/cm2). The release of cytokines was determined by enzyme-linked immunosorbent assay, after different periods of incubation (0, 12, 24, and 48 hours) post-irradiation. The proliferation of fibroblast cells suspended in irradiated M1-supernatent was evaluated for the same periods of incubation. Results: The results showed that PBM significantly enhanced M1-related cytokine release (p < 0.05). Obviously, IL-1β increased post-irradiation at 1.2 J/cm2 more than other doses for all incubation periods. TNF-α was decreased significantly after two days of irradiation (p < 0.005) for all doses. A significant increase in fibroblast proliferation (p < 0.005) was observed concomitant with the boost of cytokine release. Conclusion: This in vitro study has demonstrated that the PBM of the 850 nm diode laser therapy can enhance M1-related cytokine release, which in turn increases the proliferation of fibroblast cells. Moreover, PBM at 850 nm plays an anti-inflammatory role, which manifested by decreasing the level of TNF-α. Therefore, this therapy may be able to accelerate the wound healing process.
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreImproving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
This study, which was conducted in the city of Mosul, through collected 1200 samples from the stool of patients with diarrhea attending hospitals and private clinics for the period from the beginning of January 2019 to the end of December 2019, those whose ages ranged from less than a year-60 year, and for both sexes and by reality 700 samples stool for males and 500 samples stool for females. Samples were collected in clean, sterile, and sealed 40ml plastic bottles. Patient information is noted, name of the parasite, history, sex, age, address. The result showed that climate and temperature have a significant effect on increase the incidence of intestinal parasites through the direct effect on the increase in infection rate. This effect wa
... Show MoreAbstract
Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h
... Show MoreIn this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show More