The outbreak of a current public health coronavirus 2019 disease is a causative agent of a serious acute respiratory syndrome and even death. COVID-19 has exposed to multi-suggested pharmaceutical agents to control this global disease. Baricitinib, a well-known antirheumatic agent, was one of them. This article reviews the likely pros and cons of baricitinib in attenuation of COVID-19 based on the mechanism of drug action as well as its pharmacokinetics. The inhibitory effect of baricitinib on receptor mediated endocytosis promoter, AKK1, and on JAK-STAT signaling pathway is benefacial in inhibition of both viral assembling and inflammation. Also, its pharmacokinetic has encouraged the physicians toward the drug selection for COVID-19 treatment. On the other hand, most of baricitinib side effects are dose-dependent. In conclusion, targeting of AAK1 and JAK1/2 using baricitinib has predicted to be potential and effective with minimal side effects in management COVID-19 infected patients for a short therapeutic dosing period. Laboratory monitoring should be considered for some parameters. However, experimental trials are mandatory for a long-term treatment with a lower dose of baricitinib to evaluate its effectiveness and safety in patients with moderate COVID-19 infection.
A Photo Dynamic Therapy (PDT) is a technique which is used with Laser to treat many of cancer
tissues. This paper deals with the relatively new therapeutic technique (PDT) with pulsed Nd:glass Laser
which was applied to human soft tissues (Ovary and Kidney tissues), and to the hard tissues (freshly
extracted human teeth), with power density of 280 watt/mm2 and exposure time 330 usec. Different
dyes (Blue, methylene, eosin, and orange) were applied to the area before irradiation to study the effect
of the pigments on the laser interaction with biological tissues. The zone of treatment (Z-necrosis) with
aid of MATLAB was determined. The relationship of zone of treatment with exposure time,
accumulated damage and fracti
This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on th
... Show MoreRapid population growth and the development of industries result in an increase in solid waste. Glass, which represents a large proportion of solid waste, can be used in construction applications. The utilization of recycled glass waste in the asphalt mixture is considered an environmentally-friendly application. In this laboratory study, glass bottles were recycled by crushing, grinding, and sieving them into particles that pass through sieve No. 200 to be used as a partial replacement for the filler in the hot mixture asphalt of wearing course Type-A. The ratios (4, 4.3, 4.6, 4.9, 5.2,5.5) were used to determine the optimum asphalt content (OAC), and three ratios (30, 60, and 90) were used for the replacement of limestone powder filler to
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show MoreIn this paper, we have been used the Hermite interpolation method to solve second order regular boundary value problems for singular ordinary differential equations. The suggest method applied after divided the domain into many subdomains then used Hermite interpolation on each subdomain, the solution of the equation is equal to summation of the solution in each subdomain. Finally, we gave many examples to illustrate the suggested method and its efficiency.
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreBackground: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More