This study was aimed to monitor oral zinc sulfate role on local cervical proinflammatory cytokines in HPV-infected women comparing with these cytokines before treatment application. A cervical secretion got from 28 infected women before and after treatment with zinc sulfate, these samples assessed various markers of inflammation including interleukin-1β, IL-8, and IL-12. Results manifested that improve and clear the cervical HPV infections after three months of zinc treatment 46.43% and 21.43%, respectively. Viral infections with single and multiple HPV high-risk types are raising of studied cytokines after 3-month compared with single HPV low-risk type. Moreover, this increasing was statistically significant only in IL-12 and IL-1. Women more than 30 years and with multiple HPV genotypes are the most benefit of zinc treatment had a high level of cytokines. This study concludes that IL-1 and IL-12 secretion are the most effects with zinc treatment at over three months to improve mild HPV infection with good hygiene.
to study the discribrion and the pollution in the environment in the south of baghdad samples of waste water from industrail units using the mercury in its process also
The public procurement crisis in Iraq plays a fundamental role in the delay in the implementation of construction projects at different stages of project bidding (pre, during, and after). The procurement system of any country plays an important role in economic growth and revival. The paper aims to use the fuzzy logic inference model to predict the impact of the public procurement crisis (relative importance index and Likert scale) was carried out at the beginning to determine the most important parameters that affect construction projects, the fuzzy analytical hierarchy process (FAHP) to set up, and finally, the fuzzy decision maker's (FDM) verification of the parameter for comparison with reality. Sixty-five
... Show MoreThe apoptotic activity of methionine γ- lyase from Pseudomonas putida on cancer cell lines was indicated by measuring the concentration of cytochrome c in the supernatants of cell lines. The result revealed high concentration of cytochrome c in the supernatants of cancer cell lines (RD, AMGM and AMN3) respectively while the concentration of anti-apoptotic protein (Bcl-2) was very low.
SnS nanobelt thin films were deposited on glass substrates in acidic solution by chemical bath deposition (CBD) method. The belt-like morphologies of as-deposited SnS thin films were characterized by scanning electron microscope (SEM) and transmission electron microscopy (TEM). X-ray diffraction (XRD) and Raman measurements were carried out to confirm the crystal structures and phase purities of SnS nanobelt thin films. The morphologies and phase purities of SnS thin films were influenced greatly by the tin and sulfur precursors. The bandgaps of SnS nanobelts were determined to be 1.39–1.41 eV by UV–vis absorption and photoluminescence (PL) spectra. Current-voltage ((I-V)) and current-time ((I-T)) characteristics were studied to demon
... Show MoreThe aim of the present research is to investigate the effecting of pH parameter on the feasibility of lead removal from simulated wastewater using an electrochemical system. Electrocoagulation method is one of electrochemical technology which is used widely to treat industrial wastewater. Parameters affecting this operation, such as initial metal concentration, applied current, stirrer speed, and contact time of electroprocessing were taken as 155ppm, 1.5 Ampere, 150 rpm, 60 minutes respectively. While pH of the simulated wastewater was in the range of 2 to 12 in the experiments. It was found from the results that pH is an important parameter affecting lead removal operation. The best value of pH parameter is appro
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreThis paper presents a numerical analysis using ANSYS finite element program to simulate the reinforced concrete slabs with spherical voids. Six full-scale one way bubbled slabs of (3000mm) length with rectangular cross-sectional area of (460mm) width and (150mm) depth are tested as simply supported under two-concentrated load. The results of the finite element model are presented and compared with the experimental data of the tested slabs. Material nonlinearities due to cracking and crushing of concrete and yielding of reinforcement are considered. The general behavior of the finite element models represented by the load-deflection curves at midspan, crack pattern, ultimate load, load-concrete strain curves and failure m
... Show MoreNitinol (NiTi) is used in many medical applications, including hard tissue replacements, because of its suitable characteristics, including a close elastic modulus to that of bones. Due to the great importance of the mechanical properties of this material in tissue replacements, this work aims to study the hysteresis response in an attempt to explore the ability of the material to remember its previous mechanical state in addition to its ability to withstand stress and to obtain the optimal dimensions and specifications for the manufacturer of NiTi actuators. Stress-strain examination is done in a computational way using a mutable Lagoudas MATLAB code for various coil radii, environment temperatures, and coil lengths. The computational m
... Show MoreIn this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is
... Show MoreWith the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s
... Show More