Gum Arabic is a natural gummy exudate gained from the trees of Acacia species (Acacia senegal and Acacia seyal), Family: Fabaceae. Gum Arabic considers as a dietary fiber with a high percentage of carbohydrates and low protein content. Sugars arabinose and ribose were originally discovered and isolated from gum Arabic and it is representing the original source of these sugars. A gum emanation from trees occurs under stress conditions such as heat, poor soil fertility, drought, and injury. Mainly gum is produced in belt region of Africa, mainly Sudan, Chad, and Nigeria. In the food industry, it is used in confectionery; in the pharmaceutical industry, it is used as emulsifier, film coating and others. Traditionally the gum used for chronic renal failure, digestive discomfort, and others. Although gum Arabic considered as an inert substance, recent information demonstrated multiple pharmacological and medical effects, such as weight reduction, antihypertensive, antihyperlipidemic, anticoagulant, antibacterial, antidiabetic, anti-inflammatory, nephroprotective and other effects.
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreAbstract: Facial defects resulting from neoplasms, congenital, acquired malformations or trauma can be restored with facial prosthesis using different materials and retention methods to achieve life-like look and function. A nasal prosthesis can re-establish aesthetic form and anatomic contours for mid-facial defects, often more effectively than by surgical reconstruction as the nose is relatively immobile structure. For successful results, lot of factors such as harmony, texture, color matching and blending of tissue interface with the prosthesis are important. The aim of this study is to describe the non-surgical rehabilitation with nasal prosthesis for an Iraqi patient who received rhinectomy as a result of squamous cell carcinoma of the
... Show MoreThe convergence speed is the most important feature of Back-Propagation (BP) algorithm. A lot of improvements were proposed to this algorithm since its presentation, in order to speed up the convergence phase. In this paper, a new modified BP algorithm called Speeding up Back-Propagation Learning (SUBPL) algorithm is proposed and compared to the standard BP. Different data sets were implemented and experimented to verify the improvement in SUBPL.
In this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp
... Show MoreBackground: Ulcerative colitis (UC) is an inflammatory bowel disease restricted to the large intestine, characterized by superficial ulceration. It is a progressive and chronic disease requiring long-term treatment. Although its etiology remains unknown, it is suggested that environmental factors influence genetically susceptible individuals, leading to the onset of the disease. (C-X-C) ligand 9 is a chemokine that belongs to the CXC chemokine family, it plays a role in the differentiation of immune cells such as cytotoxic lymphocytes, natural killer T cells, and macrophages. Its interaction with its corresponding receptor CXCR3 which is expressed by a variety of cells such as effector T cells, CD8+ cytotoxic T cells, and macrophage
... Show MoreRecently emerging pandemic SARS CoV-2 conquered our world since December 2019. Continuous efforts have been done to find out effective immunization and precise treatment stetratigies A way from therapeutic options that were tried in SARS CoV-2, an increased attention is directed to predict natural products and mainly phytochemicals as collaborative measures for this crisis. In this review, most of the mentioned compounds specially flavonoids (biacalin, hesperidin, quercetin, luteolin,, and phenolic (resveratrol, curcumin, and theaflavin) exert their effect through interfering with the action of one or more of this proteins (spike protein, papain like protease, 3 chymotrypsin like cysteine protease, and RNA dependent RNA
... Show MoreMost Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show More