75 research outputs found

    The antidiabetic effect of L-carnitine in rats: the role of nitric oxide system

    Get PDF
    Background: Nowadays, the use of L-carnitine in the treatment of diabetes is increasing. This study was conducted to investigate the effect of co-administration of L-arginine (precursor for the synthesis of nitric oxide) and nitro-L-arginine (nitric oxide synthesis inhibitor) on antidiabetic activity of L-carnitine in diabetic rats. Materials and Methods: In this study, 50 male rats weighing 180-201g were divided into five groups: (1) non diabetic control rats; (2) untreated diabetic rats; (3) diabetic rats treated with L-carnitine 300 mg/kg (4); diabetic rats treated with L-carnitine 300 mg/kg + L-arginine 300 mg/kg; and (5) diabetic rats treated with L-carnitine (300 mg/kg) + nitro-L-arginine (1mg/kg). Type 1 diabetes was induced by a single intraperitoneal injection of 110 mg/kg body weight alloxan. After 30 days, liver malondialdehyde levels, lipid profile, serum glucose, and glycated hemoglobin serum levels were measured. Results: Blood glucose, liver enzymes, glycated hemoglobin, and liver malondialdehyde levels significantly decreased in diabetic rats treated with L-carnitine compared to the untreated diabetic group (P<0.05). The co-administration of L-arginine and L-carnitine led to a significant decrease in glycated hemoglobin levels and serum glucose, in a manner similar to the group received only L-carnitine. Also, L-arginine and nitro-l-arginine had similar effects on liver lipid peroxidation and serum biochemical parameters. Conclusion: The results suggest that the hypoglycemic effect of L-carnitine is mediated independently from nitric oxide pathways. The interaction between L-carnitine and L-arginine may not be synergistic. So, their combined administration is not recommended for the diabetic patients

    A study of Email date attacks in Network Security

    Get PDF
    Abstract:- phishers have made uses of an increase email of delivery systems handing over confidential and personal information. After 12 years of spoofing attacks publicity, spoofing attacks to the professional whose run them. While spoofed mail developing phisher attack vectors, protect their customer personal data. Business Customer has become way of “officially” e-mail data and question the integrity of the web sites they now connected to as their confidence With various governments and industry groups to preventing any organizations can takes a proactive approach’s in combining the email attacks threat. the tool understand and technique use by these professional criminals, and analyze flaw in their own perimeters securities or application, organization can preventing successfully data spoofing attack techniques .These update paper cover the technologies and securities flaw spoofed exploit to conducted their attack, and provide detail vendor advice on what the organization can do to preventing data attack. The information, security professionals and customer can works to protect them selve again the next attack scam to reached their mail inboxes. An office worker clicks on an attachment in email. This infect each Personal computer with malware that components of other machine in each office by snooped password that travel across the MAN. Anthers of the attacks techniques that make sense only in a networks context is web hacking. DOI: 10.17762/ijritcc2321-8169.15014

    Effect of topical honey application along with intralesional injection of glucantime in the treatment of cutaneous leishmaniasis

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Leishmaniasis is an endemic disease in Iran. Although many treatments have been suggested for this disease, there hasn't been an effective and safe treatment yet. Regarding the healing effect of honey in the chronic ulcers and its reported therapeutic effect in cutaneous leishmaniasis, we performed a study to better evaluate the efficacy of honey in cutaneous leishmaniasis and its final scar.</p> <p>Methods</p> <p>In a prospective clinical trial, 100 patients with confirmed cutaneous leishmaniasis were selected and randomized into 2 groups. Group A were treated with topical honey twice daily along with intralesional injection of glucantime once weekly until complete healing of the ulcer or for maximum of 6 weeks. Group B were treated with intralesional injection of glucantime alone until complete healing of the ulcer or for a maximum of 6 weeks, too. The patients were followed for 4 months. The collected data were analyzed statistically using statistical tests including Chi-square, Mann Whitney and Kaplan – Mayer tests.</p> <p>Results</p> <p>In this study, 45 patients that had cutaneous leishmaniasis were treated with intralesional glucantime alone and 45 patients were treated with topical honey and glucantime . Ten patients left out the study. In the glucantime alone treated group, 32 patients (71.1%) had complete cure whereas in the group treated with both glucantime & topical honey, 23 patients (51.1%) achieved complete cure. This difference was significant statistically (p = 0.04).</p> <p>Conclusion</p> <p>Further studies to better clarify the efficacy of honey in cutaneous leishmaniasis is needed. We suggest that in another study, the efficacy of honey with standardized level of antibacterial activity is evaluated against cutaneous leishmaniasis.</p

    Fuzzy evidence theory and Bayesian networks for process systems risk analysis

    Get PDF
    YesQuantitative risk assessment (QRA) approaches systematically evaluate the likelihood, impacts, and risk of adverse events. QRA using fault tree analysis (FTA) is based on the assumptions that failure events have crisp probabilities and they are statistically independent. The crisp probabilities of the events are often absent, which leads to data uncertainty. However, the independence assumption leads to model uncertainty. Experts’ knowledge can be utilized to obtain unknown failure data; however, this process itself is subject to different issues such as imprecision, incompleteness, and lack of consensus. For this reason, to minimize the overall uncertainty in QRA, in addition to addressing the uncertainties in the knowledge, it is equally important to combine the opinions of multiple experts and update prior beliefs based on new evidence. In this article, a novel methodology is proposed for QRA by combining fuzzy set theory and evidence theory with Bayesian networks to describe the uncertainties, aggregate experts’ opinions, and update prior probabilities when new evidences become available. Additionally, sensitivity analysis is performed to identify the most critical events in the FTA. The effectiveness of the proposed approach has been demonstrated via application to a practical system.The research of Sohag Kabir was partly funded by the DEIS project (Grant Agreement 732242)

    Computational Modeling for Cardiac Resynchronization Therapy

    Get PDF

    Mathematical Modeling and Simulation of Ventricular Activation Sequences: Implications for Cardiac Resynchronization Therapy

    Get PDF
    Next to clinical and experimental research, mathematical modeling plays a crucial role in medicine. Biomedical research takes place on many different levels, from molecules to the whole organism. Due to the complexity of biological systems, the interactions between components are often difficult or impossible to understand without the help of mathematical models. Mathematical models of cardiac electrophysiology have made a tremendous progress since the first numerical ECG simulations in the 1960s. This paper briefly reviews the development of this field and discusses some example cases where models have helped us forward, emphasizing applications that are relevant for the study of heart failure and cardiac resynchronization therapy

    Global burden of 369 diseases and injuries in 204 countries and territories, 1990-2019: a systematic analysis for the Global Burden of Disease Study 2019

    Get PDF

    Five insights from the Global Burden of Disease Study 2019

    Get PDF
    The Global Burden of Diseases, Injuries, and Risk Factors Study (GBD) 2019 provides a rules-based synthesis of the available evidence on levels and trends in health outcomes, a diverse set of risk factors, and health system responses. GBD 2019 covered 204 countries and territories, as well as first administrative level disaggregations for 22 countries, from 1990 to 2019. Because GBD is highly standardised and comprehensive, spanning both fatal and non-fatal outcomes, and uses a mutually exclusive and collectively exhaustive list of hierarchical disease and injury causes, the study provides a powerful basis for detailed and broad insights on global health trends and emerging challenges. GBD 2019 incorporates data from 281 586 sources and provides more than 3.5 billion estimates of health outcome and health system measures of interest for global, national, and subnational policy dialogue. All GBD estimates are publicly available and adhere to the Guidelines on Accurate and Transparent Health Estimate Reporting. From this vast amount of information, five key insights that are important for health, social, and economic development strategies have been distilled. These insights are subject to the many limitations outlined in each of the component GBD capstone papers.Peer reviewe

    International Journal on Recent and Innovation Trends in Computing and Communication A study of Email date attacks in Network Security

    No full text
    Abstract:-phishers have made uses of an increase email of delivery systems handing over confidential and personal information. After 12 years of spoofing attacks publicity, spoofing attacks to the professional whose run them. While spoofed mail developing phisher attack vectors, protect their customer personal data. Business Customer has become way of -officially‖ e-mail data and question the integrity of the web sites they now connected to as their confidence With various governments and industry groups to preventing any organizations can takes a proactive approach&apos;s in combining the email attacks threat. the tool understand and technique use by these professional criminals, and analyze flaw in their own perimeters securities or application, organization can preventing successfully data spoofing attack techniques .These update paper cover the technologies and securities flaw spoofed exploit to conducted their attack, and provide detail vendor advice on what the organization can do to preventing data attack. The information, security professionals and customer can works to protect them selve again the next attack scam to reached their mail inboxes. An office worker clicks on an attachment in email. This infect each Personal computer with malware that components of other machine in each office by snooped password that travel across the MAN. Anthers of the attacks techniques that make sense only in a networks context is web hacking
    corecore