Preferred Language
Articles
/
IRdbjI8BVTCNdQwC1nsn
Effect of Inhalation Exposure to Nano-Imidacloprid on Liver and Kidney Functions In Male Rats
...Show More Authors
Abstract<p>Pesticide poisoning is a serious global public health issue and is responsible for a sizable number of annual fatalities. This study was designed to examine the potentially harmful effects of adult rats being exposed to imidacloprid (IMD) as a nanoparticle by determining the chronic effect of inhalation of (5,10 and 20) mg/kg/b.w. of nano-imidacloprid for a duration of 60 days. The most important biochemical parameters of the serum liver function parameters were aspartate aminotransferase (AST), alanine aminotransferase (ALT), and alkaline phosphatase ALP, kidney function [blood urea, creatinine, and urea], and oxidative stress parameters (MDA, GSH, and CAT) in all treated groups when compared to the control group. The exposure caused a highly significant decrease (P≤0.05) for (AST) and (ALT). No significant changes were observed, while a highly significant decrease was recorded for (ALP) in all treatments with nano-imidacloprid compared with the control. On the other hand, a highly significant decrease in blood urea, creatinine, and uric acid was recorded in all groups treated with nano-imidacloprid compared with the control. Oxidative stress parameters revealed a highly significant (P≤0.05) increase in malondialdehyde (MDA) after 60 days of exposure and a decline in reduced glutathione (GSH) and catalase activity CAT.</p>
Scopus Crossref
View Publication
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use sensitivity analysis in evaluating projects Investment under the conditions of risk and uncertainty Case study of glass bottles project in Anbar province
...Show More Authors

This paper studies the investment project evaluation under the condition of uncertainty. Evaluation of investment project under risk and uncertainty is possible to be carried out through application of various methods and techniques. The best known methods are : Risk-adjusted discount rate , certainty equivalent method , Sensitivity analysis and Simulation method The objective of this study is using the sensitivity analysis in evaluation Glass Bottles project  in Anbar province under the condition of risk and uncertainty.

After applying sensitivity analysis we found that the glass bottles project  sensitive to the following factors (cash flow, the cost of investment, and the pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Role of Some Inflammatory Markers (IL-6 and CRP) in the Pathogenesis of Acute Coronary Syndrome in Iraqi CCU for Heart Diseases
...Show More Authors

In this work an enzyme linked immunosorbent assay (ELISA) technique has been used for detection of some inflammatory markers in serum of acute coronary syndrome (ACS)-Patients Admitted to the cardiac care unit (CCU) of Iraqi Centre For Heart Diseases and Ibn AlNafees Teaching Hospital. The present method includes quantitative measurement of interleukine-6 (IL-6) and C-reactive protein (CRP), as their increase during symptoms may be responsible for identifying the mechanism of myocardial damag, in addition to their best performance than other quantitative tests perhaps due to their association with atherosclerotic process that belongs to the endothelial dysfunction. Aim of this study is to estimate the prevalence and correlation of IL-6 w

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages
Free will between Slavery and Freedom: A Study of Linda Brent in Incidents in the Life of a Slave Girl by Harriet Jacobs
...Show More Authors

Harriet Jacobs was a writer and a reformer. As a female writer in the nineteenth century, Jacobs wrote her narrative as a means of resisting the system of slavery. She wrote her book Incidents in the Life of a Slave Girl: Written by Herself, (1842) to reflect upon the exploitation of the black people and the need to change the hierarchal attitude that governs white/black relations. She was engaged in many abolitionist events and her anti-slavery approach appeared clearly in her writings. She shares Du Bios ideas about freedom and emancipation and the need for a political and cultural change. Thus, Du Bois’s theory provides a framework for her autobiographical novel where she portrays Linda Brent, the main character, a strong wille

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
F-Compact operator on probabilistic Hilbert space
...Show More Authors

This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Adsorption Study for Trifluralin on Iraqi ? –Alumina
...Show More Authors

Equilibrium adsorption isotherm for the removal of trifluralin from aqueous solutions using ? –alumina clay has been studied. The result shows that the isotherms were S3 according Giels classification. The effects of various experimental parameters such as contact time, adsorbent dosage, effect of pH and temperature of trifluralin on the adsorption capacities have been investigated. The adsorption isotherms were obtained by obeying freundlich adsorption isotherm with (R2 = 0.91249-0.8149). The thermodynamic parameters have been calculated by using the adsorption process at five different temperature, the values of ?H, ?G and ?S were (_1.0625) kj. mol-1, (7.628 - 7.831) kj.mol-1 and (_2.7966 - _2.9162) kg.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Agricultural And Statistical Sciences
ON ERROR DISTRIBUTION WITH SINGLE INDEX MODEL
...Show More Authors

In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.

Scopus
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
On Čech fuzzy soft bi-clouser spaces
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More