Mycotoxins are secondary by-products of mold metabolism and are accountable for human and animal mycotoxicosis. The most serious trichothecenic mycotoxin is the fungal T-2 mycotoxin. T-2 mycotoxin impaired nutrient absorption, metabolism, and then, eliciting severe oxidoreductive stress. Diet plays a key role beyond the supply of nutrients in order to promote animal and human health. Organic acids have been commonly used to exert antioxidative stress capacity in the liver and gut ecosystem. This study is planned to explore, the competence of using (X-MoldCid®) during chronic T-2 mycotoxicosis course in rat. Rats were allocated into 4 main groups, (CN-Gr), negative control and was allowed for the free access to the normal rats chow and the tap water for 90 days. (OAC-Gr), which was assigned as the organic acids positive control and was allowed for the free access to normal rat chow and (X-MoldCid®) in the tap water for 90 days .Group 3 or (T2-Gr) and was given the T2 contaminated chow ad libitum and group 4 (T2+OAC-Gr) .Each one of the four groups was subdivided into two subgroups (n=7) that one was sacrificed on day 45 (Subgroup A) meantime the remaining rats (Subgroup B) maintained until finishing of the entire study period (90 days). In T2 intoxicated group, liver histopathological findings revealed, lesions of reversible types (hydropic and fatty degenerations) while intestinal histopathological findings revealed, lesions of hyperactive goblet cells with sever slaughing of epithelia. In T2+OAC-Gr, the ultimate efficacy of organic acids success in limiting the apoptotic activity and preventing hepatic necroinflammatory changes which were in accordance with the improvement of antioxidative status, liver and intestinal function enzymes and other serum biochemical estimated tests. The total results of this study have been clarified the regenerative and antioxidant potentials of (X-MoldCid®) in coping with T2-toxin mediated intestinal lesions and hepatotoxicityin rats.
Although there are many wastewater treatment plants, we still suffer from many problems resulting from a lack of experience or technical operating problems. In this research, the service’s efficiency is evaluated according to the design laws required for small factories in the province of Najaf, which works with filtering technology through point filtration, the old project in the Al-Baraka plant, and the second works. Within the biological treatment mbbr + activated sludge, which is a biomass technology where samples were taken from both plants and annual values of the pollutant rate after treatment in the old Al-Baraka plant project COD 64 mg/L and the demand for biochemical oxyge
The study includes building a 3-D geological model, which involves get the Petrophysical properties as (porosity, permeability and water saturation). Effective Porosity, water saturation results from log interpretation process and permeability from special correlation using core data and log data. Clay volume can be calculated by six ways using IP software v3.5 the best way was by using gamma Ray. Also, Water Resistivity, flushed zone saturation and bulk volume analysis determined through geological study. Lithology determined in several ways using M-N matrix Identification, Density-Neutron and Sonic-Neutron cross plots. The cut off values are determined by Using EHC (Equivalent Hydra
The purpose of this study is discuss the effect of Corporate Governance in the Tax Planning, has been made in a sample of Iraqi Industrial contribution Companies listed in Iraqi Stock Exchange Market (ISE) , for the period from 2008 to 2012.The study used the" Experimental Research Approach" . Also used the (Modified Jones Model, 1995) in order to measure the corporate governance, to measure the extent of the practice of corporate governance in the samples companies. While it use to measure tax planning, the model that used by studies and researches of tax that adopted in discussions of tax reform, by analyzing the financial statements of companies to reach a measurement for the two variables of the study. T
... Show MoreAcute myeloid leukemia (AML) is heterogeneous disorders originated from the abnormalities in the proliferation and maturation of myeloid progenitors in bone morrow. There is a clinical correlation between immunity engines and disease progression, but this relationship is not completely clear yet. This study was designed to assess the full immune response in Iraqi patients diagnosed with AML. Patients and healthy volunteers were divided into three groups: newly diagnosed untreated, under chemotherapy treatment patients and control group. A significant reduction were seen in C4 and IFN-γ levels in both untreated and treated groups with no significant difference between untreated and treated groups. On the other hand, IL-2 and IL-8 levels inc
... Show MoreAZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
The study is done in the period between (February 20 and October 20) by using ten adult quail Coturnix coturnix (Linnaeus, 1758). The sections are preparing by paraffin method then stain in Harris haematoxylin-eosin. The histological aspects of spinal cord in quail (Coturnix coturnix) the white matter is in the outer part, while the gray matter is arranged in from of X represents its internal part, the dorsal region is called the dorsal horns while the ventral region is called the ventral horns and the central canal cavity, the spinal cord areas appeared as follows: The medial column, column of von Lenhossek, lateral column, dorsal magnocellular column and marginal paragriseal, columns are also called Hoffmann’s nuclei.
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More