TNF-α-induced osteoclastogenesis is central to post-menopausal and inflammatory bone loss, however, the effect of phytoestrogens on TNF-α-induced bone resorption has not been studied. The phytoestrogens genistein, daidzein, and coumestrol directly suppressed TNF-α-induced osteoclastogenesis and bone resorption. TRAP positive osteoclast formation and resorption area were significantly reduced by genistein (10(-7) M), daidzein (10(-5) M), and coumestrol (10(-7) M), which was prevented by the estrogen antagonist ICI 182,780. TRAP expression in mature TNF-α-induced osteoclasts was also significantly reduced by these phytoestrogen concentrations. In addition, in the presence of ICI 182,780 genistein and coumestrol (10(-5) -10(-6) M) augmented TNF-α-induced osteoclast formation and resorption. However, this effect was not observed in the absence of estrogen antagonist indicating that genistein's and coumestrol's ER-dependent anti-osteoclastic action normally negates this pro-osteoclastic effect. To determine the mechanism mediating the anti-osteoclastic action we examined the effect of genistein, coumestrol, and daidzein on caspase 3/7 activity, cell viability and expression of key genes regulating osteoclast differentiation and fusion. While anti-osteoclastic phytoestrogen concentrations had no effect on caspase 3/7 activity or cell viability they did significantly reduce TNF-α-induced c-fos and NFATc1 expression in an ER dependent manner and also inhibited NFATc1 nuclear translocation. Significant decreases in NFκB and DC-STAMP levels were also noted. Interestingly, constitutive c-fos expression prevented the anti-osteoclastic action of phytoestrogens on differentiation, resorption and NFATc1. This suggests that phytoestrogens suppress TNF-α-induced osteoclastogenesis via inhibition of c-fos-dependent NFATc1 expression. Our data provides further evidence that phytoestrogens have a potential role in the treatment of post-menopausal and inflammatory bone loss directly inhibiting TNF-α-induced resorption.
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
In this article, performing and deriving te probability density function for Rayleigh distribution is done by using ordinary least squares estimator method and Rank set estimator method. Then creating interval for scale parameter of Rayleigh distribution. Anew method using is used for fuzzy scale parameter. After that creating the survival and hazard functions for two ranking functions are conducted to show which one is beast.
The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreIn this work, a CW CO2 laser was used for cutting samples of the fiber-reinforced
plastics (FRP) of three different types of reinforcing material; aramide, glass and carbon.
Cutting process was investigated throughout the variation of some parameters of cutting
process and their effects on cutting quality as well as the effect of an inert gas exist in the
interaction region and finally using a mechanical chopper in order to enhance the cutting
quality. Results obtained explained the possibility to perform laser cutting with high
quality in these materials by good control of the parameters and conditions of the process.
In this research estimated the parameters of Gumbel distribution Type 1 for Maximum values through the use of two estimation methods:- Moments (MoM) and Modification Moments(MM) Method. the Simulation used for comparison between each of the estimation methods to reach the best method to estimate the parameters where the simulation was to generate random data follow Gumbel distributiondepending on three models of the real values of the parameters for different sample sizes with samples of replicate (R=500).The results of the assessment were put in tables prepared for the purpose of comparison, which made depending on the mean squares error (MSE).
In the present study, gold nanoparticles (AuNPs) were prepared using a simple low cost method synthesized cold plasma at different exposure time . The nanoparticles were characterized using UV-Visible spectra, X-ray diffraction (XRD). The prepared AuNPs showed surface Plasmon resonance centered at 530, 540,and 533 nm. The XRD pattern showed that the strong intense peaks indicate crystalline nature and face centered cubic structure of gold nanoparticles for all samples were prepared .The average crystallite size of the AuNPs was 20-40 nm. Morphology of the AuNPs were carried out using FESEM. Observations show that the AuNPs synthesized we well dispersed with and particle sizes ranging from 9 to 31 nm with spherical shapes which are cle
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show More