Studies from our laboratory have shown that Δ9-Tetrahydrocannabinol (THC), an ingredient found in marijuana plant Cannabis sativa, can attenuate acute lung injury induced by Staphylococcus enterotoxin B (SEB). In the current study, we investigated the role of THC on the metabolism of SEB-activated lymphocytes. To this end, we determined metabolic potential of SEB-activated lymphocytes treated with vehicle or THC by performing the Cell Mito Stress Test. The oxygen consumption rate (OCR) in THC-treated cells was decreased when compared to vehicle-treated group whereas the extracellular acidification rate (ECAR) was similar in both the groups. Specifically, electron transport chain inhibitors namely, oligomycin, FCCP and rotenone+antimycinA were added to measure ATP-linked respiration, maximal respiration and non-mitochondrial respiration, respectively. THC treatment led to a significant decrease in the basal respiration, ATP production, proton (H+) leak, maximal respiration, spare respiratory capacity and nonmitochondrial respiration. We also performed the Mito Fuel Flex assay to measure the dependency, capacity and flexibility of cells to oxidize glucose, glutamine and fatty acids. Treatment with inhibitors, BPTES and etomoxir showed a decline in the OCR in SEB+vehicle treated cells demonstrating that glutamine and/or fatty acids serve as major source of fuel in these cells when compared to SEB+THC treated group. However, when UK5099 was added, THC- and vehicle-treated cells showed a reduced response thereby indicating that glucose dependency was similar in both the groups. Together, THC modulates metabolic functions of activated lymphocytes which may affect their signaling, differentiation and toxicity.
The problem of research is that there are ways to protect and sustain environmentally important sites in Iraq. There are no documentary sources for these sites, such as the natural landscape of natural and important natural resources, which suffer from severe environmental neglect
The aim of this study is to propose mathematical expressions for estimation of the flexural strength of plain concrete members from ultrasonic pulse velocity (UPV) measurements. More than two hundred pieces of precast concrete kerb units were subjected to a scheduled test program. The tests were divided into two categories; non-destructive ultrasonic and bending or rupture tests. For each precast unit, direct and indirect (surface) ultrasonic pulses were subjected to the concrete media to measure their travel velocities. The results of the tests were monitored in two graphs so that two mathematical relationships can be drawn. Direct pulse velocity versus the flexural strength was given in the first relationship while the second equation des
... Show MoreAs the temperature of combustion gases is higher than the melting temperature of the turbine materials, cooling of turbine parts in a gas turbine engine is necessary for safe operation. Cooling methods investigated in this computational study included cooling flow losses. Film-cooling is one typically used cooling method whereby coolant is supplied through holes passage, in present study the holes placed along the camber line of the blade. The subject of this paper is to evaluate the heat transfer that occur on the holes of blade through different
blowing coolant rates. The cases of this study were performed in a low speed wind tunnel with two tip gap at small and large (0.03 and 0.09cm) and multiple coolant flow rates through the fil
The research attempts to identify the pattern of punctuation in contemporary Iraqi poetry through delving into the poetry of an Iraqi poet belonging to the seventieth generation, Namik Abdul Deeb, who belongs to the poets of Arab modernity in general, the research has reached many results, including that the signs of deletion were vocabulary marks any They are located in the center of the poetic singular, or inline markers, which are those that fall within the poetic line of the prose poem separating its vocabulary, or cross-sectional marks located within the poetic passages that are part of the poetic text, and finally text marks which are located within the poetic text and fragmented into Parts. The research also found that the work of
... Show MoreThe study started from the problems of wars and the damage that result from deterioration and destruction of infrastructure and the absence of planning and urban reconstruction. The study aims to address the condition of the bad destroyed bridges that have paralyzed traffic from the right and left sides of the city of Mosul. The study is based on the assumption that the reconstruction of bridges will improve the transportation network in the city of Mosul. The study relied on several approaches, including: the historical approach by reviewing global and local experiences and the descriptive approach to review the reality of the state of Mosul after the liberation process, through maps and the analytical approach through statistics and da
... Show MoreThis research aims the effects of negative media on the educational identity of community. Whereas display the concept of educational identity and its basic components, as well as the role of educational institutions for example the school and the family in form it and reinforcing this identity to individuals. The study showcasing the harmful impact of both traditional and modern media on identity and values, spotlight several examples like the promotion of consumerism and materialism through television programs. which results in the young people to adopt materialistic values like simplicity. The study concludes that media is a double-edged weapon: it can instill virtues and support education if used duly, but it can also weaken the educat
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show More