The outbreak of a current public health coronavirus 2019 disease is a causative agent of a serious acute respiratory syndrome and even death. COVID-19 has exposed to multi-suggested pharmaceutical agents to control this global disease. Baricitinib, a well-known antirheumatic agent, was one of them. This article reviews the likely pros and cons of baricitinib in attenuation of COVID-19 based on the mechanism of drug action as well as its pharmacokinetics. The inhibitory effect of baricitinib on receptor mediated endocytosis promoter, AKK1, and on JAK-STAT signaling pathway is benefacial in inhibition of both viral assembling and inflammation. Also, its pharmacokinetic has encouraged the physicians toward the drug selection for COVID-19 treatment. On the other hand, most of baricitinib side effects are dose-dependent. In conclusion, targeting of AAK1 and JAK1/2 using baricitinib has predicted to be potential and effective with minimal side effects in management COVID-19 infected patients for a short therapeutic dosing period. Laboratory monitoring should be considered for some parameters. However, experimental trials are mandatory for a long-term treatment with a lower dose of baricitinib to evaluate its effectiveness and safety in patients with moderate COVID-19 infection.
Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreThe study was performed to isolate and identify the Myxococcus fulvus from the one hundred samples of soils of farms. Special growth conditions had been used to support the growth of M.fulvus local isolates and suppressed the growth of other microorganisms like (Drying , High Temperature , High concentration of antibiotics and specific growth media ) M.fulvus isolates had been subjected to the morphological, cultural , biochemical examination for identification , as well as , study the inhibitory activites of cells and filtrates of localized isolates against some pathogenic fungi include (Trichophyton mentagrophytes , Microsporum gypseum , Aspergillus niger and Fusarium oxyporum ) by using three methods :- Cup assay , well diffusio
... Show MoreThis study attempts to test the interactive role played by organizational agility in enhancing the effect of organizational anomie on the behavior of planned human resources. The study of organizational anomie has increased because of the moral and legal pressures facing the organization by the external environment within its framework. To adapt to all external developments faced by these organizations, the behavior of human resources planned reflects the ability of individuals to control their behavior in different situations and situations that face them in the work.
The problem of the research indicates that there is a clear lack of understanding of what is meant by the variables studied in the sample
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show More