The wound healing process is incredibly intricate, consisting of a series of cellular activities. Although, this complex process has the potential to degenerate and result in chronic wound problems that are resistant to biological healing mechanisms. Nanoparticles can help to reduce inflammation, promote tissue regeneration, and accelerate wound healing. The proteolytic enzymes are believed to break down proteins and other molecules that can cause inflammation and impede the healing process. Wound was created in vivo using adult mice, and by taking blood samples the hematological parameters were evaluated to detected the effects of bromelain, silver nanoparticles and Br-AgNPs. The results shows an increased in white blood cells WBC, RBC, MC
... Show MoreA huge potential from researchers was presented for enhancing the nonlinear optical response for materials that interacts by light. In this work, we study the nonlinear optical response for chemically prepared nano- fluid of silver nanoparticles in de-ionized water with TSC (Tri-sodium citrate) protecting agent. By the means of self-defocusing technique and under CW 473 nm blue laser, the reflected diffraction pattern were observed and recorded by CCD camera. The results demonstrate that, the Ag nano-fluid shows a good third order nonlinear response and the magnitude of the nonlinear refractive index was in the order of 10−7 cm2/W. We determine the maximum change of the nonlinear refractive index and the related phase shift for the mat
... Show MoreSelenium is naturally present in the human body, animals, and plants, and is one of the important elements in their growth and maintenance. Recently, the nanoform of selenium has attracted attention due to its low toxicity and a high degree of adsorption compared to its organic and inorganic forms. The current study aimed to examine the effect of Cress leaves (Lepidium sativum L.) extract in combination with selenium nanoparticles in alleviating polycystic ovary syndrome in letrozole-induced PCOS in adult female rats. Nonthermal or cold plasma was used in the synthesis of selenium nanoparticles. Subsequently, the produced nanoparticles were identified, the 30 rats were divided into 6 equal groups, the first group was healthy (negative contr
... Show MoreThe aim of study is to identify the histological changes in ovaries of the albino mice exposed to silver nanoparticles. Sixty adult females were collected and exposures by 4000 p.p.m. and 50-150 nm in size, Females were divided into 3treated groups. The concentration dosage was (1, 1.5 and 2) p.p.m. of silver nanoparticles for 7, 14 and 21 days as exposure periods as well as control group which treated by normal saline. Treated groups appeared different histopathological changes, it is depending on the concentration of silver nanoparticles and the period of exposure. These changes were included congestion in the blood vessels, hemorrhage, hyaline degeneration, fatty degeneration, pyknosis, necrosis as well as fusion of cells in follicula
... Show MoreThe pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed
This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show More