Direct agglutination test was used to evaluate the immunogenicity of three different antigens inoculated in hamsters as one , two and three doses which were: Group (1) inoculated with autoclaved killed Leishmania tropica , Group (2) inoculated with BCG vaccine alone while Group (3) inoculated with mixed antigens (autoclaved killed Leishmania "AKL"+ BCG).(4) Control animals inoculated with phosphate buffer saline. The maximum level of antibody titers were evaluated in animal inoculated with one , two or three dose of mixed antigens (320 , 640 and 1280) respectively when it compared with animals inoculated with corresponding doses of AKL antigen (80 , 160 and 320) respectively. While the minimum level of antibody titers were observed in ani
... Show MoreThe liver is the primary organ for drug metabolism, elimination, Cyclophosphamid is the classical alkylating agent nitrogen mustard, its metabolism into two cytotoxic metabolites, and increase reactive oxygen species that is make liver toxicity. Safranal as the most abundant chemical in saffron essential oil, it have anti-oxidant, anti-inflammatory, antiapoptic and free radical scavenger activity. The aim of study is to assess the protective effects of safranal on the cyclophosphamide-induce liver toxicity in rat model. This occur by using five different groups of rats; control group, treatment group, cyclophosamide group (intraperitoneal i.p), cyclophosamide and (50mg and 100mg) oral safranal treatment groups. This study showed this pro
... Show MoreBacterial toxins are considered to be virulence factors due to the fact that they interfere with the normal processes of the host cell in which they are found. The interplay between the infectious processes of bacteria and the immune system is what causes this impact. In this discussion, we are going to focus on bacterial toxins that act in the extracellular environment, especially on those that impair the activity of macrophages and neutrophils. These toxins are of particular interest since they may be found in a wide variety of bacteria. We will be concentrating our efforts, in particular, on the toxins that are generated by Gram-positive and Gram-negative bacteria. These toxins are able to interact with and have an effect on the many dif
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Leishmaniasis is one of the neglected parasitic diseases, which belongs to the family Trypanosomatidae. Cutaneous leishmaniasis is endemic in Iraq and the available drugs are of side effect or resistant by the parasite. In this study, cytotoxicity of methotrexate was investigated on the promastigotes proliferation of the Iraqi strain ofL.tropica.The results showed a significant (p ≥ 0.05) difference in growth of treated groupsat all concentration (1000, 500, 250, 125.5, 62.5, 31.25, 15.6) μM, after 24 and 48 hours of follow up, while after 72 hours, significant difference was observed at concentration(1000, 125, 62.5) μM.The IC50 measured after 24and 48 hours and it was 40.366 and 44.452 μM, respectively.The present study showed
... Show MoreThe study aims to achieve several objectives, including follow-up scientific developments and transformations in the modern concepts of the Holistic Manufacturing System for the purpose of identifying the methods of switching to the entrances of artificial intelligence, and clarifying the mechanism of operation of the genetic algorithm under the Holonic Manufacturing System, to benefit from the advantages of systems and to achieve the maximum savings in time and cost of machines Using the Holistic Manufacturing System method and the Genetic algorithm, which allows for optimal maintenance time and minimizing the total cost, which in turn enables the workers of these machines to control the vacations in th
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreAbstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.