Cutaneous leishmaniasis is a disease caused by Leishmania tropica parasite. Current treatments for this parasite are undesirable because of their toxicity, resistance, and high cost. Macrophages are key players against pathogens. Nitric oxide (NO), a molecule produce by immune cells, controls intracellular killing of pathogens during infection. Silver nanoparticles (Ag NPs) demonstrated broad-spectrum activity against various types of infectious diseases. It has the ability to stimulate oxygen species production. This study aims to analyze the macrophages activation through NO production and estimate the cytotoxicity based on the lactate dehydrogenase (LDH) release upon exposure to L. tropica and Ag NPs. Serially concentrations of Ag NPs were used under two conditions during and following macrophages exposure to L. tropica. MTT assay was used to determine the cytotoxicity of Ag NPs on L. tropica amastigotes during infection of macrophages in vitro. The results showed that by increasing the Ag NPs concentrations, the viability percentage of L. tropica amastigotes decreased and reached to 21.7 ± 0.64 % during infection compared with the control. The 50% inhibitory concentration of Ag NPs on amastigotes was 2.048µg/ml during infection. Moreover, post-phagocytosis study involved the assessment of NO and LDH release by macrophages upon exposure to L. tropica. It have shown that untreated macrophages released low levels of NO while in the presence of Ag NPs, macrophages were activated to produce higher levels of NO under all experimental conditions. On the other hand, macrophages were capable of controlling cytotoxicity and decreasing LDH levels during phagocytosis of L. tropica amastiogotes. Taking together, these findings suggest that Ag NPs can enhance macrophages NO production which provides a method for the identification of Ag NPs ligands with microbicidal and anti-cytotoxic properties against L. tropica pathogens.
The long healing time of bone after tooth extraction in order to construct artificial teeth is uncomfortable to the patient because of aesthetic or masticatory problems in addition to the daily visit to dental clinic. The objective of this study was to evaluate the effect of 805 nm diode laser with long time intervals on repair of bone and skin incisions in rabbits through biochemical, radiological and histological findings. Eighteen New-Zealand rabbits were undergone surgical operations to make a cavity in the bone of the lower jaw, the rabbits were divided into two groups:- Group A (control group) containing nine rabbits. Group B (lased group) containing nine rabbits in which two cavities were done, one on the right side and the other
... Show MoreThis study used a continuous photo-Fenton-like method to remediate textile effluent containing azo dyes especially direct blue 15 dye (DB15). A Eucalyptus leaf extract was used to create iron/copper nanoparticles supported on bentonite for use as catalysts (E@B-Fe/Cu-NPs). Two fixed-bed configurations were studied and compared. The first one involved mixing granular bentonite with E@B-Fe/Cu-NPs (GB- E@B-Fe/Cu-NPs), and the other examined the mixing of E@B-Fe/Cu-NPs with glass beads (glass beads-E@B-Fe/Cu-NPs) and filled to the fixed-bed column. Scanning electron microscopy (SEM), zeta potential, and atomic forces spectroscopy (AFM) techniques were used to characterize the obtained particles (NPs). The effect of flow rate and DB15 concent
... Show MoreIn this research, the results of the Integral breadth method were used to analyze the X-ray lines to determine the crystallite size and lattice strain of the zirconium oxide nanoparticles and the value of the crystal size was equal to (8.2nm) and the lattice strain (0.001955), and then the results were compared with three other methods, which are the Scherer and Scherer dynamical diffraction theory and two formulas of the Scherer and Wilson method.the results were as followsScherer crystallite size(7.4nm)and lattice strain(0.011968),Schererdynamic method crystallite size(7.5 nm),Scherrer and Wilson methodcrystallite size( 8.5nm) and lattice strain( 0.001919).And using another formula for Schearer and Wilson methodwe obtain the size of the c
... Show MoreHerein, a cost-effective bio approach using extract derived from desert truffles (Tirmania nivea) is utilized to synthesize gold nanoparticles (AuNPs). AuNPs were thoroughly investigated using UV–vis, XRD, SEM, and TEM analyses. It was shown that nanoparticles had an fcc structure with a smooth spherical surface, an average diameter of 9.44 ± 0.26 nm, and an SPR band observed at 548 nm. Investigations were conducted on AuNPs' antibacterial and anti-cancer properties of prostate cancer cells. The findings suggest that AuNPs showed better antibacterial effects against S. aureus compared to E. coli, P. aeruginosa, and K. pneumoniae. AuNPs’ combination with antibiotics demonstrated a synergistic effect with significant antibacterial activi
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreIn this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.
Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show MoreThe invention relates to a coordinate measuring machine (CMM) for determining a measuring position of a probe. The AACMM isdepends on the robotkinematics (forward and reverse) in their measurementprinciple, i.e., using the AACMM links and joint angles todetermine the exact workspace or part coordinates. Hence, themeasurements are obtained using an AACMM will be extremely accurate and precise since that ismerely dependent on rigid structural parameters and the only source of measurement error is due to human operators. In this paper, a new AACMM design was proposed. The new AACMM design addresses common issues such as solving the complex kinematics, overcoming the workspace limitation, avoiding singularity, and eliminating the effects of
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreIn this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.