Celery (Apium graveolens L. ; family : Apiaceae) was often used as a spice in daily food. However, this plant contains many antioxidant compounds useful for attenuating neurodegenerative disorders including Parkinson's disease. Planting celery in the form of microgreens harvested 15 days was expected to increase the content of bioactive compounds. In the current study, we intended to evaluate the neuromodulatory potential of methanol extract of celery microgreens on fruit flies (Drosophila melanogaster Meigen : family Drosophilidae ; ordo : Diptera) which were exposed to paraquat. Neuroprotective capacity was assessed by survival rate, locomotor performance, lipid peroxidation and dopamine content after being treated with 120 µg/mL extract of celery microgreens and 3.5 mM paraquat for 4 days. Phytochemical constituents from extract of celery microgreens were measured including total polyphenol content and antioxidant activity using the radicals scavenging method. Exposure of adult fruit flies to paraquat will cause a decrease in the survival and locomotor phenotype improved by extract of celery microgreens treatment. In parallel, increased malondialdehyde content from lipid peroxidation and decreased dopamine content can be improved by the presence of celery microgreens extract. Neuroprotective capacities indicate a high content of antioxidant compounds of celery microgreens extract. Our study concludes that celery microgreens exhibited to retard the effect of oxidative stress that causes Parkinson's disease.
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreVol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreResearch title: Ruling on abortion in Sharia and law.
The importance of research: Projection is of great importance because it touches the life of a living being who enjoys human qualities. However, this organism often wastes its rights and does not protect its human beings. These souls are lost in millions by the sake of casual desire or hidden desire.
The research plan: The research dealt with an introductory topic, four topics, and in each topic there are demands, branches, and a conclusion.
The most important findings of the study: The ruling on aborting the fetus in the Sharia is only permissible (and the necessity is valued at its va
... Show MoreTolerance and its impact on building society
For the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.
Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show More