Preferred Language
Articles
/
HxZ-1YgBVTCNdQwCZ4Ok
In Vivo and In Vitro Evaluation of the Protective Effects of Hesperidin in Lipopolysaccharide-Induced Inflammation and Cytotoxicity of Cell
...Show More Authors

(1) Background: Plant flavonoids are efficient in preventing and treating various diseases. This study aimed to evaluate the ability of hesperidin, a flavonoid found in citrus fruits, in inhibiting lipopolysaccharide (LPS) induced inflammation, which induced lethal toxicity in vivo, and to evaluate its importance as an antitumor agent in breast cancer. The in vivo experiments revealed the protective effects of hesperidin against the negative LPS effects on the liver and spleen of male mice. (2) Methods: In the liver, the antioxidant activity was measured by estimating the concentration of glutathione (GSH) and catalase (CAT), whereas in spleen, the concentration of cytokines including IL-33 and TNF-α was measured. The in vitro experiments including MTT assay, clonogenity test, and sulforhodamine 101 stain with DAPI (4′, 6-diamidino-2-phenylindole) were used to assess the morphological apoptosis in breast cancer cells. (3) Results: The results of this study revealed a significant increase in the IL-33 and TNF-α cytokine levels in LPS challenged mice along with a considerable elevation in glutathione (GSH); moreover, the catalase (CAT) level was higher compared to that of the control group. Cytotoxicity of the MCF-7 cell line revealed significant differences among the groups treated with different concentrations when compared to the control groups, in a concentration-dependent manner. Hesperidin significantly inhibited the colony formation of MCF7 cells when compared to that of control. Clear changes were observed in the cell shape, including cell shrinkage and chromatin condensation, which were associated with a later apoptotic stage. (4) Conclusion: The results indicate that hesperidin might be a potential candidate in preventing diseases.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Using Phragmites australis(Iraqi plant) to remove the Lead (II) Ions form Aqueous solution.
...Show More Authors

Lead remediation was achieved using simple cost, effective and eco-friendly way from industrial wastewater. Phragmitesaustralis (P.a) (Iraqi plant), was used as anovel biomaterial to remove lead ions from synthesized waste water. Different parameters which affected on adsorption processes were investigated like adsorbent dose, pH, contact time, and adsorbent particle size, to reach the optimized conditions (maximum adsorption). The adsorption of Pb (?) on (P.a) involved fast and slow process as a mechanism steps according to obey two theoretical adsorption isotherms; Langmuir and Freundlich. The thermos dynamic adsorption parameters were evaluated also. The (?H) obtained positive value that meanes adsorption of lead ions was an endothermic

... Show More
Scopus (5)
Scopus Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Different Development Scenarios to Increase the Production Rates for Fauqi Oil Field Southeastern Iraq
...Show More Authors

The Fauqi field is located about 50Km North-East Amara town in Missan providence in Iraq. Fauqi field has 1,640 MMbbl STOIIP, which lies partly in Iran. Oil is produced from both Mishrif and Asmari zones. Geologically, the Fauqi anticline straddles the Iraqi/Iranian border and is most probably segmented by several faults. There are several reasons leading to drilling horizontal wells rather than vertical wells. The most important parameter is increasing oil recovery, particularly from thin or tight reservoir permeability. The Fauqi oil field is regarded as a giant field with approximately more than 1 billion barrels of proven reserves, but it has recently experienced low production rate problems in many of its existing wells. This study

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Deriving the Composite Simpson Rule by Using Bernstein Polynomials for Solving Volterra Integral Equations
...Show More Authors

In this paper we use Bernstein polynomials for deriving the modified Simpson's 3/8 , and the composite modified Simpson's 3/8 to solve one dimensional linear Volterra integral equations of the second kind , and we find that the solution computed by this procedure is very close to exact solution.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
An algorithm for binary codebook design based on the average bitmap replacement error (ABPRE)
...Show More Authors

In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 20 2011
Journal Name
المؤتمر الدولي الثالث للاحصائيين العرب
Use a form ARX(p,q) to estimate time series for the Iraqi Economy
...Show More Authors

Due to the lack of statistical researches in studying with existing (p) of Exogenous Input variables, and there contributed in time series phenomenon as a cause, yielding (q) of Output variables as a result in time series field, to form conceptual idea similar to the Classical Linear Regression that studies the relationship between dependent variable with explanatory variables. So highlight the importance of providing such research to a full analysis of this kind of phenomena important in consumer price inflation in Iraq. Were taken several variables influence and with a direct connection to the phenomenon and analyzed after treating the problem of outliers existence in the observations by (EM) approach, and expand the sample size (n=36) to

... Show More
Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Biotechnology Research Center
Determination the titer antibodies against LPS extracted from Pseudomonas aeruginosa isolated from eye infection
...Show More Authors

Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
A Comparative Study on Association Rule Mining Algorithms on the Hospital Infection Control Dataset
...Show More Authors

Administrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
A Comparative Study on the Double Prior for Reliability Kumaraswamy Distribution with Numerical Solution
...Show More Authors

This work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Eatimation Availability Function Through Determination The Optimal Imperfect Preventive Maintenance Period By using Simulation
...Show More Authors

This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.

According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability

p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive

preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the

average durations of the preventive and corrective maintenance actions a

... Show More
View Publication Preview PDF
Crossref