Many reports confirm ulcers as an adverse effect of drugs such as nicorandil and aspirin. The exact responsible mechanisms of ulceration have until now not proved. Mucosal ulcers associated with the onset of ulcer are manifested by an increase in proinflammatory cytokine, excessive prostaglandin, and up-regulation of Endothilin-1 level, which directly impacts the release of leptin. These, released locally within mucosal tissues, have played a role in controlling the extent of local inflammatory responses and processes of mucosal repair.
This study was designed to find out the correlation of plasma leptin and prostaglandin levels as a possible mechanism of oral ulcer formation as an adverse effect of nicorandil. The effect of nicorandil for inducing ulceration was assessed. The plasma leptin and prostaglandin E2 for the tested groups in relation to the studied parameters (gender, and daily body weight change) were estimated in albino rats.
Nicorandil causes mucous membrane damage, inflammation, and ulceration. A significant reduction of plasma leptin level, which was dose-dependent, and a non-significant reduction of serum prostaglandin E2 level. The mechanisms of ulcer induction as an adverse effect of nicorandil can be related to dose-dependant leptin and prostaglandin E2 levels, which affects on repair and healing process.
Keywords: Nicorandil, Leptin, Prostaglandin E2, Ulcer.
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreIn this research, the theme for employing a simple and sensitive method is to employ a new Schiff base ligand (N’-(4- (dimethyl amino) benzylidene)-3, 5-dinitrobenzohydrazide) to estimate Ni (II) to form orange complex (N-(4-(dimethyl amino) benzylidene)-3, 5-dinitrobenzohydrazide nickel (II) chloride) in acid medium (hydrochloric acid), it gives an absorption peak at the wavelength 485 nm. The preferred conditions were studied to form the complex and obtain the highest absorbance including concentration of Schiff base ligand, the best medium for complex formation, effects of addition sequence on complex formation, the effect of temperature on the absorbance of the complex formed, and the setting time of the formed complex. The obtained r
... Show MoreActivated carbon derived from Ficus Binjamina agro-waste synthesized by pyro carbonic acid microwave method and treated with silicon oxide (SiO2) was used to enhance the adsorption capability of the malachite green (MG) dye. Three factors of concentration of dye, time of mixing, and the amount of activated carbon with four levels were used to investigate their effect on the MG removal efficiency. The results show that 0.4 g/L dosage, 80 mg/L dye concentration, and 40 min adsorption duration were found as an optimum conditions for 99.13% removal efficiency. The results also reveal that Freundlich isotherm and the pseudo-second-order kinetic models were the best models to describe the equilibrium adsorption data.
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreTwo-dimensional unsteady mixed convection in a porous cavity with heated bottom wall is numerically studied in the present paper. The forced flow conditions are imposed by providing a hydrostatic pressure head at the inlet port that is located at the bottom of one of the vertical side walls and an open vent at the top of the other vertical side wall. The Darcy model is adopted to model the fluid flow in the porous medium and the combination effects of hydrostatic pressure head and the heat flux quantity parameters are carefully investigated. These governing parameters are varied over wide ranges and their effect on the heat transfer characteristics is studied in detail. It is found that the time required to reach a desired temperature at th
... Show MoreThe aim of this study is to propose reliable equations to estimate the in-situ concrete compressive strength from the non-destructive test. Three equations were proposed: the first equation considers the number of rebound hummer only, the second equation consider the ultrasonic pulse velocity only, and the third equation combines the number of rebound hummer and the ultrasonic pulse velocity. The proposed equations were derived from non-linear regression analysis and they were calibrated with the test results of 372 concrete specimens compiled from the literature. The performance of the proposed equations was tested by comparing their strength estimations with those of related existing equations from literature. Comparis
... Show MoreMultilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated d
Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq
... Show More