Background: Parkinson's disease (PD) is a neurodegenerative aging disease, with idiopathic PD being most common. Gastrointestinal tract disorders (GITD) and microbiota changes may trigger idiopathic PD. Neurotoxins from microbiota can travel from the gut to the brain via the brain-gut axis (BGA), leading to α-syn protein misfolding and dopaminergic neuron death. Methods: The aim of the current study was to investigate the link between PD and GITD by measuring several biochemical and immunological markers in 142 patients. The biochemical markers measured were vitamins B6, B12, and D, calcium, serotonin, ghrelin, dopamine, and α-syn protein. The immunological markers included transforming growth factor-beta (TGF-β), tumor necrosis factor-alpha (TNF-α), interleukin-1 beta (IL-1β), and interferon-gamma (IFN-γ). All markers were measured using the Enzyme-Linked Immunosorbent Assay (ELISA) technique. Results: PD patients were significantly older (63.76±12.29 years) compared to GITD and control groups (41.00±15.54 and 41.25±18.30 years, respectively). Males predominated in the PD group (74.5%), while females were more common in the GITD and control groups. PD and GITD patients showed significantly lower levels of vitamins and neurotransmitters but higher calcium and α synuclein compared to controls. Immunological markers were elevated in PD and GITD groups, with significant differences between them (P-value < 0.001). Conclusion: The study concluded that certain biochemical and immunological markers provide strong evidence of the brain-gut axis's involvement in the initiation of idiopathic Parkinson's disease.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreExcessive water production is a persistent challenge in oil and gas wells, with polymer and gel solutions commonly employed for water control. This study investigates the rheological behaviour of cross-linked polyacrylamide gels and their impact on water shutoff treatment in gas wells. Rheological measurements, coreflooding experiments using Berea sandstone samples, and micromodel flow visualizations were conducted to evaluate gel performance. Results showed that during water injection, the water residual resistance factor ( Frrw ) decreases with increasing flow rates, mainly due to gel shear thinning behaviour and reduced residual gas saturation. Higher polymer concentrations in the gel enhance water permeability reduction. In contrast, un
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThis study focuses on the impact of technology on creating a dystopian world as presented by the English playwright Caryl Churchill in her play A Number (2002). This dramatic work came as a reaction to the most crucial and valuable turning point in the scientific achievements of human engineering, namely, the cloning of the sheep called Dolly. Therefore, A Number is a play that presents an analytical stage for imagining the biotechnological and scientific future. This dramatic vignette captures the playwright’s fears towards the abnormal progress of technology and science and how far such technological progress affects human relationships and identity. It also portrays how technological progress results in the feeling of a lack of
... Show MoreBackground: Developing Goalkeeper’s performance is imperative to defence the goal. As the Football match’s nature needs implementning the skill with strength, and speed. so, the Goalkeeper demands special physical abilities that enabling him the ball blocking skill masterly. Objetive: The study aimed to identify the effect of developing some special physical abilities on the goalkeeper’s performance level while blocking executed balls from the penalty mark in football using plyometric training. Methodology: The experimental approach (continuous training that divided into two phases: General preparation, and Special preparation stage) was adopted for one experimental group by pre/post-measurements. The research sample was delib
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show More