Investigating Prostaglandin E2 and Intracellular Oxidative Stress Levels in Lipopolysaccharide-Stimulated RAW 264.7 Macrophages upon Treatment with Strobilanthes crispus

Background: Uncontrolled inflammation may cause serious inflammatory diseases if left untreated. Non-steroidal anti-inflammatory drug (NSAIDs) is commonly used to inhibit pro-inflammatory enzymes, thus, reduce inflammation. However, long term administration of NSAIDs leads to various complications. Medicinal plants are getting more attention as it is believed to be more compatible with human body. One of them is a flavonoid-containing medicinal plants, Strobilanthes crispus which has been traditionally claimed to possess anti-inflammatory and antioxidant activities. Nevertheless, its anti-inflammatory activities are yet to be scientifically documented. Objectives: This study aimed to examine the anti-inflammatory activity of S. crispus by investigating its effects on intracellular oxidative stress and prostaglandin E2 (PGE2) levels. Materials and Methods: In this study, the Maximum Non-toxic Dose (MNTD) of methanol extract of both leaves and stems of S. crispus was first determined using 3-(4,5-dimethylthiazolyl-2)-2,5-diphenytetrazolium Bromide (MTT) assay. The effects of S. crispus extracts at MNTD and half MNTD (½MNTD) on intracellular ROS as well as PGE2 levels in 1.0 µg/mL LPS-stimulated RAW 264.7 macrophages were then be measured using DCFH-DA and a competitive enzyme immunoassay kit, respectively. Results: The MNTD of leaf extract was determined as 700µg/mL while for stem was as low as 1.4µg/mL. When LPS-stimulated RAW 264.7 macrophages were subjected to the MNTD of S. crispus leaf extract, both intracellular ROS and PGE2 levels were significantly reduced. In contrast, stem extract at both MNTD and ½MNTD did not significantly reduce the PGE2 level, but significantly increased the intracellular ROS level. Conclusion: The methanol leaf extract of S. crispus may possess anti-inflammatory properties as it is able to significantly reduce the intracellular ROS and PGE2 levels of LPS-stimulated cells. Nevertheless, further studies such as investigating the interleukin, nitric oxide and cytokine tumor necrosis factor-α (TNFα) levels has to be conducted to further confirm the anti-inflammatory properties of S. crispus.

Blood Lipid Profile and Liver Lipid Peroxidation in Normal Rat Fed with Different Concentrations of Acacia senegal and Acacia seyal

The aim of the present study was to evaluate the blood lipid profile and liver lipid peroxidation in normal rat fed with different concentrations of Acacia senegal and Acacia seyal. Thirty six Sprague Dawley male rats each weighing between 180-200g were randomly divided into two groups. Each group contains eighteen rats and were divided into three groups of 6 rats per group. The rats were fed ad libitum with commercial rat’s feed and tap water containing different concentrations of Acacia senegal and Acacia seyal (3% and 6%) for 4 weeks. The results at 4 weeks showed that there was no significant difference (p≤0.05) in the total cholesterol (TC) and triglycerides (TG) between the control group and treated groups while the results for the high density lipoprotein (HDL-C) showed a significant decrease (P≥0.05) at the 3% and 6% of gum arabic treated groups compared to control group. There was a significant increase (P≥0.05) in low density lipoprotein (LDL-C) with 3% and 6% of gum Arabic (GA) groups compared to the control group. The study indicated that there was no significant (p≤0.05) effect on TC and TG but there was significant effect (P≥0.05) on HDL-C and LDL-C in blood lipid profile of normal rat. The results showed that after 4 weeks of treatment the malondialdehyde (MDA) value in rat fed with 6% of A. seyal group was significantly higher (P≥0.05) than control or other treated groups of A. seyal and A. senegal studied. Thus, the two species of gum arabic did not have beneficial effect on blood lipid profile and lipid peroxidation.

Role of Leaders in Managing Employees’ Dysfunctional Behavior at Workplace

The objective of this theoretical study is to explore in depth the role of leaders in managing employees’ dysfunctional behavior at workplace in an effort to recommend strategies and solutions for these destructive behaviors that affect employees’ performance. The significance of the study lies in the fact that dysfunctional behavior has been widely spread in almost all organizations, public and private, with its very destructive manifestations. Dysfunctional behavior may be classified into thefts, sabotage, sexual harassment, jealousy, envy, revenge, vulgarity all of which affect employees’ moral, self-esteem and satisfaction level drastically which will be reflected negatively on their performance and productivity. The main research question will focus on the role of leaders in managing employees’ dysfunctional behavior effectively at the workplace through the different strategies and control measures. In this study, the data will be collected from different academic literature and through some primary data by conducting interviews with some public and private employees from different managerial levels and fields.

Dynamic Bandwidth Allocation in Fiber-Wireless (FiWi) Networks

Fiber-Wireless (FiWi) networks are a promising candidate for future broadband access networks. These networks combine the optical network as the back end where different passive optical network (PON) technologies are realized and the wireless network as the front end where different wireless technologies are adopted, e.g. LTE, WiMAX, Wi-Fi, and Wireless Mesh Networks (WMNs). The convergence of both optical and wireless technologies requires designing architectures with robust efficient and effective bandwidth allocation schemes. Different bandwidth allocation algorithms have been proposed in FiWi networks aiming to enhance the different segments of FiWi networks including wireless and optical subnetworks. In this survey, we focus on the differentiating between the different bandwidth allocation algorithms according to their enhancement segment of FiWi networks. We classify these techniques into wireless, optical and Hybrid bandwidth allocation techniques.

Flexible Arm Manipulator Control for Industrial Tasks

This paper addresses the control problem of a class of hyper-redundant arms. In order to avoid discrepancy between the mathematical model and the actual dynamics, the dynamic model with uncertain parameters of this class of manipulators is inferred. A procedure to design a feedback controller which stabilizes the uncertain system has been proposed. A PD boundary control algorithm is used in order to control the desired position of the manipulator. This controller is easy to implement from the point of view of measuring techniques and actuation. Numerical simulations verify the effectiveness of the presented methods. In order to verify the suitability of the control algorithm, a platform with a 3D flexible manipulator has been employed for testing. Experimental tests on this platform illustrate the applications of the techniques developed in the paper.

Implementation and Modeling of a Quadrotor

In this study, the quad-electrical rotor driven unmanned aerial vehicle system is designed and modeled using fundamental dynamic equations. After that, mechanical, electronical and control system of the air vehicle are designed and implemented. Brushless motor speeds are altered via electronic speed controllers in order to achieve desired controllability. The vehicle's fundamental Euler angles (i.e., roll angle, pitch angle, and yaw angle) are obtained via AHRS sensor. These angles are provided as an input to the control algorithm that run on soft the processor on the electronic card. The vehicle control algorithm is implemented in the electronic card. Controller is designed and improved for each Euler angles. Finally, flight tests have been performed to observe and improve the flight characteristics.

Transient Analysis and Mitigation of Capacitor Bank Switching on a Standalone Wind Farm

There exist significant losses on transmission lines due to distance, as power generating stations could be located far from some isolated settlements. Standalone wind farms could be a good choice of alternative power generation for such settlements that are far from the grid due to factors of long distance or socio-economic problems. However, uncompensated wind farms consume reactive power since wind turbines are induction generators. Therefore, capacitor banks are used to compensate reactive power, which in turn improves the voltage profile of the network. Although capacitor banks help improving voltage profile, they also undergo switching actions due to its compensating response to the variation of various types of load at the consumer’s end. These switching activities could cause transient overvoltage on the network, jeopardizing the end-life of other equipment on the system. In this paper, the overvoltage caused by these switching activities is investigated using the IEEE bus 14-network to represent a standalone wind farm, and the simulation is done using ATP/EMTP software. Scenarios involving the use of pre-insertion resistor and pre-insertion inductor, as well as controlled switching was also carried out in order to decide the best mitigation option to reduce the overvoltage.

A System Functions Set-Up through Near Field Communication of a Smartphone

We present a method to set up system functions through a near filed communication (NFC) of a smartphone. The short communication distance of the NFC which is usually less than 4 cm could prevent any interferences from other devices and establish a secure communication channel between a system and the smartphone. The proposed set-up method for system function values is demonstrated for a blacbox system in a car. In demonstration, system functions of a blackbox which is manipulated through NFC of a smartphone are controls of image quality, sound level, shock sensing level to store images, etc. The proposed set-up method for system function values can be used for any devices with NFC.

Towards a Secure Storage in Cloud Computing

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Control Strategy of Solar Thermal Cooling System under the Indonesia Climate

Solar thermal cooling system was installed on Mechanical Research Center (MRC) Building that is located in Universitas Indonesia, Depok, Indonesia. It is the first cooling system in Indonesia that utilizes solar energy as energy input combined with natural gas; therefore, the control system must be appropriated with the climates. In order to stabilize the cooling capacity and also to maximize the use of solar energy, the system applies some controllers. Constant flow rate and on/off controller are applied for the hot water, chilled water and cooling water pumps. The hot water circulated by pump when the solar radiation is over than 400W/m2, and the chilled water is continually circulated by pump and its temperature is kept constant 7 °C by absorption chiller. The cooling water is also continually circulated until the outlet temperature of cooling tower below than 27 oC. Furthermore, the three-way valve is used to control the hot water for generate vapor on absorption chiller. The system performance using that control system is shown in this study results.

Prediction of Cutting Tool Life in Drilling of Reinforced Aluminum Alloy Composite Using a Fuzzy Method

Machining of Metal Matrix Composites (MMCs) is very significant process and has been a main problem that draws many researchers to investigate the characteristics of MMCs during different machining process. The poor machining properties of hard particles reinforced MMCs make drilling process a rather interesting task. Unlike drilling of conventional materials, many problems can be seriously encountered during drilling of MMCs, such as tool wear and cutting forces. Cutting tool wear is a very significant concern in industries. Cutting tool wear not only influences the quality of the drilled hole, but also affects the cutting tool life. Prediction the cutting tool life during drilling is essential for optimizing the cutting conditions. However, the relationship between tool life and cutting conditions, tool geometrical factors and workpiece material properties has not yet been established by any machining theory. In this research work, fuzzy subtractive clustering system has been used to model the cutting tool life in drilling of Al2O3 particle reinforced aluminum alloy composite to investigate of the effect of cutting conditions on cutting tool life. This investigation can help in controlling and optimizing of cutting conditions when the process parameters are adjusted. The built model for prediction the tool life is identified by using drill diameter, cutting speed, and cutting feed rate as input data. The validity of the model was confirmed by the examinations under various cutting conditions. Experimental results have shown the efficiency of the model to predict cutting tool life.

A Paradigm Shift towards Personalized and Scalable Product Development and Lifecycle Management Systems in the Aerospace Industry

Integrated systems for product design, manufacturing, and lifecycle management are difficult to implement and customize. Commercial software vendors, including CAD/CAM and third party PDM/PLM developers, create user interfaces and functionality that allow their products to be applied across many industries. The result is that systems become overloaded with functionality, difficult to navigate, and use terminology that is unfamiliar to engineers and production personnel. For example, manufacturers of automotive, aeronautical, electronics, and household products use similar but distinct methods and processes. Furthermore, each company tends to have their own preferred tools and programs for controlling work and information flow and that connect design, planning, and manufacturing processes to business applications. This paper presents a methodology and a case study that addresses these issues and suggests that in the future more companies will develop personalized applications that fit to the natural way that their business operates. A functioning system has been implemented at a highly competitive U.S. aerospace tooling and component supplier that works with many prominent airline manufacturers around the world including The Boeing Company, Airbus, Embraer, and Bombardier Aerospace. During the last three years, the program has produced significant benefits such as the automatic creation and management of component and assembly designs (parametric models and drawings), the extensive use of lightweight 3D data, and changes to the way projects are executed from beginning to end. CATIA (CAD/CAE/CAM) and a variety of programs developed in C#, VB.Net, HTML, and SQL make up the current system. The web-based platform is facilitating collaborative work across multiple sites around the world and improving communications with customers and suppliers. This work demonstrates that the creative use of Application Programming Interface (API) utilities, libraries, and methods is a key to automating many time-consuming tasks and linking applications together.

Accuracy of Small Field of View CBCT in Determining Endodontic Working Length

An in vitro study was carried out to evaluate the feasibility of small field of view (FOV) cone beam computed tomography (CBCT) in determining endodontic working length. The objectives were to determine the accuracy of CBCT in measuring the estimated preoperative working lengths (EPWL), endodontic working lengths (EWL) and file lengths. Access cavities were prepared in 27 molars. For each root canal, the baseline electronic working length was determined using an EAL (Raypex 5). The teeth were then divided into overextended, non-modified and underextended groups and the lengths were adjusted accordingly. Imaging and measurements were made using the respective software of the RVG (Kodak RVG 6100) and CBCT units (Kodak 9000 3D). Root apices were then shaved and the apical constrictions viewed under magnification to measure the control working lengths. The paired t-test showed a statistically significant difference between CBCT EPWL and control length but the difference was too small to be clinically significant. From the Bland Altman analysis, the CBCT method had the widest range of 95% limits of agreement, reflecting its greater potential of error. In measuring file lengths, RVG had a bigger window of 95% limits of agreement compared to CBCT. Conclusions: (1) The clinically insignificant underestimation of the preoperative working length using small FOV CBCT showed that it is acceptable for use in the estimation of preoperative working length. (2) Small FOV CBCT may be used in working length determination but it is not as accurate as the currently practiced method of using the EAL. (3) It is also more accurate than RVG in measuring file lengths.

Study on Metabolic and Mineral Balance, Oxidative Stress and Cardiovascular Risk Factors in Type 2 Diabetic Patients on Different Therapy

Intense oxidative stress, increased glycated hemoglobin and mineral imbalance represent risk factors for complications in diabetic patients. Cardiovascular complications are most common in these patients, including nephropathy. This study was conducted in 2015 at the Procardia Laboratory in Tîrgu Mureș, Romania on 40 type 2 diabetic adults. Routine biochemical tests were performed on the Konleab 20XTi analyzer (serum glucose, total cholesterol, LDL and HDL cholesterol, triglyceride, creatinine, urea). We also measured serum uric acid, magnesium and calcium concentration by photometric procedures, potassium, sodium and chloride by ion selective electrode, and chromium by atomic absorption spectrometry in a group of patients. Glycated hemoglobin (HbA1c) dosage was made by reflectometry. Urine analysis was performed using the HandUReader equipment. The level of oxidative stress was measured by serum malondialdehyde dosage using the thiobarbituric acid reactive substances method. MDRD (Modification of Diet in Renal Disease) formula was applied for calculation of creatinine-derived glomerular filtration rate. GraphPad InStat software was used for statistical analysis of the data. The diabetic subject included in the study presented high MDA concentrations, showing intense oxidative stress. Calcium was deficient in 5% of the patients, chromium deficiency was present in 28%. The atherogenic cholesterol fraction was elevated in 13% of the patients. Positive correlation was found between creatinine and MDRD-creatinine values (p

Using Metacognitive Strategies in Reading Comprehension by EFL Students

Metacognitive strategies consistently play important roles in reading comprehension. The metacognitive strategies involve the active monitoring and consequent regulation and orchestration of the cognitive processes in relation to the cognitive objects or data on which they bear. In this paper, the effect of instruction in using metacognitive strategies on reading academic materials, type of metacognitive strategies were mostly used by college university students before and after the instruction and the level they use those strategies before and after the instruction were studied. For these aims, 50 female college students were chosen. Then, they were divided randomly into two groups, experimental and control groups. At first session, students in both groups took the standard TOFEL exam. After the pre-test had been administered, the instruction began. After treatment, a post-test was taken. It is useful to state that after pre-test and post-test the same questionnaire was handed to the students of experimental group. The results of this research show that the instruction of metacognitive strategies has positive effect on the students' scores in reading comprehension tests. Furthermore, it showed that before and after the instruction, the students' usage of metacognitive strategies changed. Also, it demonstrated that the instruction affected the students' level of metacognitive strategies' usage.

0.13-μm CMOS Vector Modulator for Wireless Backhaul System

In this paper, a CMOS vector modulator designed for wireless backhaul system based on 802.11ac is presented. A poly phase filter and sign select switches yield two orthogonal signal paths. Two variable gain amplifiers with strongly reduced phase shift of only ±5 ° are used to weight these paths. It has a phase control range of 360 ° and a gain range of -10 dB to 10 dB. The current drawn from a 1.2 V supply amounts 20.4 mA. Using a 0.13 mm technology, the chip die area amounts 1.47x0.75 mm².

Development of Combined Cure Type for Rigid Pavement with Reactive Powder Concrete

In this study, fiberless reactive powder concrete (RPC) was produced with high pressure and flexural strength. C30/37 concrete was chosen as the control sample. In this study, 9 different cure types were applied to fiberless RPC. the most suitable combined cure type was selected according to the pressure and flexure strength. Pressure and flexural strength tests were applied to these samples after curing. As a result of the study, the combined cure type with the highest pressure resistance was obtained. The highest pressure resistance was achieved with consecutive standard water cure at 20 °C for 7 days – hot water cure at 90 °C for 2 days - drying oven cure at 180 °C for 2 days. As a result of the study, the highest pressure resistance of fiberless RPC was found as 123 MPa with water cure at 20 °C for 7 days - hot water cure at 90 °C for 2 days - drying oven cure at 180 °C for 2 days; and the highest flexural resistance was found as 8.37 MPa for the same combined cure type.

Effect of Biostimulants to Control the Phelipanche ramosa L. Pomel in Processing Tomato Crop

The experimental trial was carried out in open field at Foggia district (Apulia Region, Southern Italy), during the spring-summer season 2014, in order to evaluate the effect of four biostimulant products (RadiconÒ, Viormon plusÒ, LysodinÒ and SiaptonÒ 10L), compared with a control (no biostimulant), on the infestation of processing tomato crop (cv Dres) by the chlorophyll-lacking root parasite Phelipanche ramosa. Biostimulants consist in different categories of products (microbial inoculants, humic and fulvic acids, hydrolyzed proteins and aminoacids, seaweed extracts) which play various roles in plant growing, including the improvement of crop resistance and quali-quantitative characteristics of yield. The experimental trial was arranged according to a complete randomized block design with five treatments, each of one replicated three times. The processing tomato seedlings were transplanted on 5 May 2014. Throughout the crop cycle, P. ramosa infestation was assessed according to the number of emerged shoots (branched plants) counted in each plot, at 66, 78 and 92 day after transplanting. The tomato fruits were harvested at full-stage of maturity on 8 August 2014. From each plot, the marketable yield was measured and the quali-quantitative yield parameters (mean weight, dry matter content, colour coordinate, colour index and soluble solids content of the fruits) were determined. The whole dataset was tested according to the basic assumptions for the analysis of variance (ANOVA) and the differences between the means were determined using Tukey’s tests at the 5% probability level. The results of the study showed that none of the applied biostimulants provided a whole control of Phelipanche, although some positive effects were obtained from their application. To this respect, the RadiconÒ appeared to be the most effective in reducing the infestation of this root-parasite in tomato crop. This treatment also gave the higher tomato yield.

Adaptive Fuzzy Control of a Nonlinear Tank Process

Liquid level control of conical tank system is known to be a great challenge in many industries such as food processing, hydrometallurgical industries and wastewater treatment plant due to its highly nonlinear characteristics. In this research, an adaptive fuzzy PID control scheme is applied to the problem of liquid level control in a nonlinear tank process. A conical tank process is first modeled and primarily simulated. A PID controller is then applied to the plant model as a suitable benchmark for comparison and the dynamic responses of the control system to different step inputs were investigated. It is found that the conventional PID controller is not able to fulfill the controller design criteria such as desired time constant due to highly nonlinear characteristics of the plant model. Consequently, a nonlinear control strategy based on gain-scheduling adaptive control incorporating a fuzzy logic observer is proposed to accurately control the nonlinear tank system. The simulation results clearly demonstrated the superiority of the proposed adaptive fuzzy control method over the conventional PID controller.