There is a correlation between the occurrence of anxiety and the production of inflammatory mediators, and red ginger rhizome is a well-known herbal product with a high content of phenolic and flavonoid compounds that can be used as anti-inflammatories and antioxidants. The aim of study to evaluate the effect of red ginger as antianxiety in mice (Mus musculus) BALB/c strain by measuring levels of TNF-α, IL-6 and IL-10. Anxiety model mice were carried out by giving treatment with the Forced Swimming Test (FST) for 7 days then assessed by carrying out the Elevated Plus Maze for Mice (EPM) test for one day. After the treatment, the anxiety mice model was made, followed by administration of red ginger ethanol extract therapy for 14 days. The distribution of the experimental animal model groups was divided into control groups (KN, K-, K+) and treatment groups (P, P2, P3).There was a significant difference the decreased of the TNF-α levels at the all of treatment groups with red ginger rhizome extract (P1, P2, P3) compared with the control groups (KN, K-) (p<0.05), the significantly decreased of IL-6 levels in the three doses treatment group (P1, P2, P3) compared to the control group (K-, K+) (p <0.05) and an increase in IL-10 levels in the 50 mg treatment group compared to group K -, statistically not significant (p>0.05).In overall, this study suggests that FST stimulation will create anxiety symptoms and behavior as well as impact cytokine levels, namely elevated levels of TNF-α and IL-6. Giving red ginger ethanol extract has the potential to be researched further for reducing anxiety symptoms because it can block pro-inflammatory cytokines by significantly decreased levels of TNF-α, IL-6, and increased IL-10 cytokines a brief abstract about your paper’s subject of study.
Although the term' tautology' predicts negative connotation, it is often employed by poets and lyric writers to communicate more implied meanings. Through the use of tautological expressions, they exchange ideas, give more possibilities to readers to detect the meaning behind the tautological words and thus suggest details not openly communicated in the poem. Ten American song lyrics and ten American poems have been selected to be the data for the study. Data analysis is conducted on the basis of three steps:(i) identifying the type of tautology used ,(ii) detecting the syntactic realization of the tautology and (iii) finding the functions of the use of tautology in these lyrics and poems. The study concludes that song lyrics and p
... Show MoreBackground Non specific colitis is defined as inflammatory condition of the colon that when examined microscopically lacks any characteristic features of any specific form of colitis and is commonly seen in reports of colonoscopy biopsies. There are many factors that cause it like obesity and H pylori.
Aim of the study To determine the association of obesity and H pylori as contributory factors to this disease.
Patients and methods This is a case-controlled study was carried out in Al-Kindy College of Medicine from January 2017 to June 2018. Sixty individuals were included; forty of them had non specific colitis. The rest were hea
The aim of this paper, study the effect of carbon nanotubes on the electrical properties of polyvinylchloride. Samples of polyvinylchloride carbon nanotubes composite prepared by using hot press technique. The weight percentages of carbon nanotubes are 0,5,10 and 20wt.%. Results showed that the D.C electrical conductivity increases with increasing of the weight percentages of carbon nanotubes. Also, the D.C electrical conductivity changed with increase temperature for different concentrations of carbon nanotubes. The activation energy of D.C electrical conductivity is decreased with increasing of carbon nanotubes concentration.
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreA new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reli
... Show More
Find interested in the harmonization of variables and determinants of supply chain planning needs of the material, leading to the results start effective supply chain management, and end up quickly modify the sizes to suit the demand and turnover in the market. As well as identifying relationships between variables, and type of relationship used by the company with the processors and their feasibility, and indicate the level of interest and willingness to redesign the supply chain Company for Electrical Industries and build an integrated model for supply chain with the MRP system can be applied in the company.
Research depend on quantitative and descriptive method, It
... Show MoreThe denoising of a natural image corrupted by Gaussian noise is a problem in signal or image processing. Much work has been done in the field of wavelet thresholding but most of it was focused on statistical modeling of wavelet coefficients and the optimal choice of thresholds. This paper describes a new method for the suppression of noise in image by fusing the stationary wavelet denoising technique with adaptive wiener filter. The wiener filter is applied to the reconstructed image for the approximation coefficients only, while the thresholding technique is applied to the details coefficients of the transform, then get the final denoised image is obtained by combining the two results. The proposed method was applied by usin
... Show MoreZM Al-Bahrani, Medico Legal Update, 2021
In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.