Photobiomodulation (PBM) is a form of the use of visible red and Near-infrared (NIR) light at low power, where a laser light photon is absorbed at the electronic level, without heat production. PBM can be applied in wide range of treatment to help the wound, inflammation, edema, and pain reduction. However, there is a lack of scientific documentation regarding its actual effects. Objectives: This study assesses the impact of PBM on the release of M1-related cytokine in monocyte cells with particular emphasis on interleukin-1β (IL-1β) and Tumour Necrosis Factor α (TNF-α). Methods: Tamm-Horsfall Protein 1 (THP-1) macrophages M1 cells have been exposed to the light from the diode laser of 850nmat different doses (0, 0.6, 1.2 and 3.6 J/cm2). The release of cytokines was determined by enzyme-linked immunosorbent assay, after different periods of incubation (0, 12, 24, and 48 hours) post-irradiation. The proliferation of fibroblast cells suspended in irradiated M1-supernatent was evaluated for the same periods of incubation. Results: The results showed that PBM significantly enhanced M1-related cytokine release (p < 0.05). Obviously, IL-1β increased post-irradiation at 1.2 J/cm2 more than other doses for all incubation periods. TNF-α was decreased significantly after two days of irradiation (p < 0.005) for all doses. A significant increase in fibroblast proliferation (p < 0.005) was observed concomitant with the boost of cytokine release. Conclusion: This in vitro study has demonstrated that the PBM of the 850 nm diode laser therapy can enhance M1-related cytokine release, which in turn increases the proliferation of fibroblast cells. Moreover, PBM at 850 nm plays an anti-inflammatory role, which manifested by decreasing the level of TNF-α. Therefore, this therapy may be able to accelerate the wound healing process.
Despite efforts to contain and manage the SARS-CoV-2 outbreak which was declared a public health emergency of international concern in January 2020 by the World Health Organization (WHO), the COVID-19 pandemic still remains a major global challenge. Patients who display the classical symptoms of the infection are easily identified, tested, isolated and monitored. However, many cases of infected asymptomatic patients have been documented. These patients are not easily identified even though many evidences suggest that they can spread the virus to others. How and why these COVID-19 asymptomatic presentations occur remain unclear. The many theories and views are conjectural, and supporting evidences are still needed. In this review, we
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More<p>Recently, reconfigurable intelligent surfaces have an increasing role to enhance the coverage and quality of mobile networks especially when the received signal level is very weak because of obstacles and random fluctuation. This motivates the researchers to add more contributions to the fields of reconfigurable intelligent surfaces (RIS) in wireless communications. A substantial issue in reconfigurable intelligent surfaces is the huge overhead for channel state information estimation which limits the system’s performance, oppressively. In this work, a newly proposed method is to estimate the angle of arrival and path loss at the RIS side and then send short information to the base station rather than huge overhe
... Show MoreThe current research aimed to analyze the importance, correlation and the effect of independent variables represented by marketing variables on the dependent variable represented by local brand, through taking ENIEM as a model for this study, which represents a sensitive sector for the Algerian consumer. The results of the study evinced that the Algerian consumer has a positive image toward the brand ENIEM given marketing variables which has acquired considerable importance to this consumer. Also, the results of this study showed a statistically significant correlation between marketing variables and good perception toward the brand ENIEM, at the same time, the existence of a statistically significant effect for each of these variables o
... Show More