Medicinal plants are used to treat various diseases although little is known about their toxicity. Coriandrum sativum is one of the most commonly plants that is used to treat several physiological disorders. Thus, this study was conducted to evaluate the effect of aqueous extract of C. sativum on the structure and function of liver in male albino mice. Thirty male mice were randomly divided into three groups: Group 1 untreated (control), Group 2 and 3 were administrated orally with the aqueous extract of the plant at dose 125 and 250 mg/kg. b. w. For 30 days. The effect of the extract on liver weights, biochemical parameters as well as histological study were assessed. There were no significant difference (P>0.05) observed in relative organ weights, serum Gpt and Got levels in mice treated with the extract at dose 125 mg/kg. b. w. while the histological section showed moderate degeneration in hepatocytes. However the treatment with 250 mg/kg. b. w. of the extract caused significant reduction (P<0.05) in liver relative weight,highly significant increased (P<0.01) in serum level of GPT and GOT as compared with control. Further histological examination revealed marked degeneration and distortion of hepatocyte, conjestion, inflammatory cells infiltration and cytoplasmic vaculation at dose of 250 mg/kg. b. w. these results suggest that oral administration of C. sativum leaves aqueous extract have a toxic effect on liver at dose 250 mg/kg. b. w.
Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreThe primary objective of this research be to develop a novel thought of fibrewise micro—topological spaces over B. We present the notions from fibrewise micro closed, fibrewise micro open, fibrewise locally micro sliceable, and fibrewise locally micro-section able micro topological spaces over B. Moreover, we define these concepts and back them up with proof and some micro topological characteristics connected to these ideas, including studies and fibrewise locally micro sliceable and fibrewise locally micro-section able micro topological spaces, making it ideal for applications where high-performance processing is needed. This paper will explore the features and benefits of fibrewise locally micro-sliceable and fibrewise locally
... Show MoreBackground. Alopecia areata (AA) is a common form of noncicatricial hair loss of unknown cause, affecting 0.1-0.2% of the general population. Most evidence supports the hypothesis that it is disease of the hair follicle of autoimmune nature mediated by T-cells, with important cytokine role. Objective of the Study. The objective of this study is to study the association and changes in serum levels of interleukin-15 (IL-15) and tumor necrosis factor-α (TNF-α) in patients with AA in relation to the type, activity, and disease duration. Patients and Methods. Thirty-eight patients with AA and 22 individuals without the disease as controls were enrolled in this case-controlled study conducted in the Department of Dermatology in the Al-K
... Show MoreWith the increasing prevalence of breast cancer among female internationally, occupies about 25% of all cases of cancer, with a measured 1.57 million up to date cases in 2012. Breast cancer has turn a most warning to health of female in Iraq, where it is the major cause of death among women after cardiovascular diseases, with a mortality rate of 23% related cancer. Recently there is a crucial requirement to include community pharmacists in health elevation activities to support awareness and early diagnosis of cancer, specially breast cancer. The aim of this study is to assess knowledge, attitude and perceived barriers amongst Iraqi community pharmacists towards health promotion of breast cancer. This study is cross sectional research. A
... Show MoreIn this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
Lithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More
The prophet said that it anybody burdened any of the people or the book more than they could endure he would ben his opponent until the day of judgment.
-under the rightly guided caliphs the Christians had much freedom .this is shown by a letter attributed to ishu-yab III. The Nestorian catholics.
-The third caliph,Uthman favoured the Christians either because of the spcial skills or abilities which they possessed or through the imfluence of his Christian wife Na'ila.
-Under the early Umayyade,the christiansins the Isalamic umma had as much freedom as they had previously enjoyed under the best of their Christians governments because they restorted their churches and appointed many Christians to the
... Show More