Abstract Intrahepatic cholestasis is clinical syndrome which cause either by defect in synthesis or bile acid flow, the pathophysiology of cholestasis is complicated by a number of variables, including oxidative stress, inflammatory response, and dysregulation of bile acid transporter . Rats, mice, and guinea pigs were utilized as experimental animals, and ANIT was administered to them in order to create a model that closely resembled intrahepatic cholestasis in human. This study examined the protective effects of papaverine, a non-narcotic opium alkaloid derived from papaver somniferum and discovered as an FXR agonist, on cholestasis in rats induced by alpha-naphthylisothiocyanate (ANIT). Rats utilized in this study divid
... Show MoreBack ground; Selective re-absorption and secretion are the functions of the collecting tubules and ducts, in addition to concentrate urine through ADH-regulated and ADH-independent water channels.Method; twenty four male rats were used, they were divided into two groups of animals: Group (A) included twelve rats of five weeks old age (before puberty) that were divided into three subgroups, four rats in each subgroup. Subgroup I was control one, subgroups II and III were treated orally with melatonin in a dose of 250 & 500 µg/kg body weights subsequently. Group (B) included twelve rats of seventeen weeks old age (after puberty) that were divided into the same subgroups and treated with the doses of melatonin as in the rats of group (
... Show MoreA sensitivity-turbidimetric method at (0-180o) was used for detn. of mebeverine in drugs by two solar cell and six source with C.F.I.A.. The method was based on the formation of ion pair for the pinkish banana color precipitate by the reaction of Mebeverine hydrochloride with Phosphotungstic acid. Turbidity was measured via the reflection of incident light that collides on the surface particles of precipitated at 0-180o. All variables were optimized. The linearity ranged of Mebeverine hydrochloride was 0.05-12.5mmol.L-1, the L.D. (S/N= 3)(3SB) was 521.92 ng/sample depending on dilution for the minimum concentration , with correlation coefficient r = 0.9966while was R.S.D%
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreAlfonso Sastre escribió La Sangre y la ceniza, su primera obra dentro de la llamada “Tragedia Compleja” en los primeros años de la década de los sesenta, pero la primera edición no apareció hasta el año 1967 y fue en lengua italiana. Por causa de la censura la obra estuvo prohibida a lo largo de muchos años, finalmente su primera edición en castellano apareció en el número 1 de la revista Pipirijaina, en octubre del año 1976. El estreno tuvo lugar en el Teatro Villarroel de Barcelona en enero de 1977, a cargo del Colectivo de Teatro ‹‹El Búho›› el cual realizó con este espectáculo una gira por toda España y más tarde lo ha representado en los Festivales Internacionales de T
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreAbstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show More