Cutaneous leishmaniasis is a disease caused by Leishmania tropica parasite. Current treatments for this parasite are undesirable because of their toxicity, resistance, and high cost. Macrophages are key players against pathogens. Nitric oxide (NO), a molecule produce by immune cells, controls intracellular killing of pathogens during infection. Silver nanoparticles (Ag NPs) demonstrated broad-spectrum activity against various types of infectious diseases. It has the ability to stimulate oxygen species production. This study aims to analyze the macrophages activation through NO production and estimate the cytotoxicity based on the lactate dehydrogenase (LDH) release upon exposure to L. tropica and Ag NPs. Serially concentrations of Ag NPs were used under two conditions during and following macrophages exposure to L. tropica. MTT assay was used to determine the cytotoxicity of Ag NPs on L. tropica amastigotes during infection of macrophages in vitro. The results showed that by increasing the Ag NPs concentrations, the viability percentage of L. tropica amastigotes decreased and reached to 21.7 ± 0.64 % during infection compared with the control. The 50% inhibitory concentration of Ag NPs on amastigotes was 2.048µg/ml during infection. Moreover, post-phagocytosis study involved the assessment of NO and LDH release by macrophages upon exposure to L. tropica. It have shown that untreated macrophages released low levels of NO while in the presence of Ag NPs, macrophages were activated to produce higher levels of NO under all experimental conditions. On the other hand, macrophages were capable of controlling cytotoxicity and decreasing LDH levels during phagocytosis of L. tropica amastiogotes. Taking together, these findings suggest that Ag NPs can enhance macrophages NO production which provides a method for the identification of Ag NPs ligands with microbicidal and anti-cytotoxic properties against L. tropica pathogens.
In this research, the results of the Integral breadth method were used to analyze the X-ray lines to determine the crystallite size and lattice strain of the zirconium oxide nanoparticles and the value of the crystal size was equal to (8.2nm) and the lattice strain (0.001955), and then the results were compared with three other methods, which are the Scherer and Scherer dynamical diffraction theory and two formulas of the Scherer and Wilson method.the results were as followsScherer crystallite size(7.4nm)and lattice strain(0.011968),Schererdynamic method crystallite size(7.5 nm),Scherrer and Wilson methodcrystallite size( 8.5nm) and lattice strain( 0.001919).And using another formula for Schearer and Wilson methodwe obtain the size of the c
... Show MoreThis study used a continuous photo-Fenton-like method to remediate textile effluent containing azo dyes especially direct blue 15 dye (DB15). A Eucalyptus leaf extract was used to create iron/copper nanoparticles supported on bentonite for use as catalysts (E@B-Fe/Cu-NPs). Two fixed-bed configurations were studied and compared. The first one involved mixing granular bentonite with E@B-Fe/Cu-NPs (GB- E@B-Fe/Cu-NPs), and the other examined the mixing of E@B-Fe/Cu-NPs with glass beads (glass beads-E@B-Fe/Cu-NPs) and filled to the fixed-bed column. Scanning electron microscopy (SEM), zeta potential, and atomic forces spectroscopy (AFM) techniques were used to characterize the obtained particles (NPs). The effect of flow rate and DB15 concent
... Show MoreGastritis can be defined as histological inflammation of the gastric mucosa. It can be classified according to the time course of the disease as acute or chronic, histological findings, anatomic location, and pathological mechanisms. The objective of this study was to evaluation of serum levels of the proinflammatory cytokines IL-8, IL-17 and IL-22 in Helicobacter pylori infection and their association with the degree of gastritis histopathology in a sample of Iraqi patients. The case-control prospective study consists of 60 patients who attended the Gastrointestinal Tract Center at Al-Kindy Teaching Hospital during the period from December 2019 to April 2020. In addition, the control group included 60 apparently healthy individuals. Bio
... Show MoreThe performa of evaluation process is a process that should be carried out by all industrial management in order to stand on aspects of development or underdevelopment of the various departments and activities in its industrial project for the purpose of identifying obstacles and find out the causes and then avoid them quickly. And intended to rectify the performance evaluation of the activities of industrial project or economic union by measuring the results achieved within a specific operational process and compare it to what is already targeted, and often the time for comparison of one year.
The process of performance evaluation depends upon several criteria and indicators within the
... Show MoreLeishmaniasis is one of the neglected parasitic diseases, which belongs to the family Trypanosomatidae. Cutaneous leishmaniasis is endemic in Iraq and the available drugs are of side effect or resistant by the parasite. In this study, cytotoxicity of methotrexate was investigated on the promastigotes proliferation of the Iraqi strain ofL.tropica.The results showed a significant (p ≥ 0.05) difference in growth of treated groupsat all concentration (1000, 500, 250, 125.5, 62.5, 31.25, 15.6) μM, after 24 and 48 hours of follow up, while after 72 hours, significant difference was observed at concentration(1000, 125, 62.5) μM.The IC50 measured after 24and 48 hours and it was 40.366 and 44.452 μM, respectively.The present study showed
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe invention relates to a coordinate measuring machine (CMM) for determining a measuring position of a probe. The AACMM isdepends on the robotkinematics (forward and reverse) in their measurementprinciple, i.e., using the AACMM links and joint angles todetermine the exact workspace or part coordinates. Hence, themeasurements are obtained using an AACMM will be extremely accurate and precise since that ismerely dependent on rigid structural parameters and the only source of measurement error is due to human operators. In this paper, a new AACMM design was proposed. The new AACMM design addresses common issues such as solving the complex kinematics, overcoming the workspace limitation, avoiding singularity, and eliminating the effects of
... Show MoreIn this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.
In this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.
A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show More