Background: Osteoarthritis is a chronic pathology of the joints causing disability and morbidity. Diacerein is a disease-modifying agent indicated for osteoarthritis management with enhanced performance and have much lower side effects profile than conventional non-steroidal anti-inflammatory drugs. Oral administration of Diacerein is associated with a laxative effect, thus causing treatment discontinuation. Aim: This study aimed to evaluate the activity of Diacerein novasome-based transdermal gel compared with standard oral treatment in the management of induced osteoarthritis in a rat model. Materials and methods: A single intra-articular injection of monosodium iodoacetate was administered to the left knee joint, resulting in the development of Osteoarthritis. Disease progression and the effect of both routes of Diacerein treatment were evaluated by morphological, biochemical, histological, and radiological studies. Results: Osteoarthritis was successfully induced in rats’ knee joints. Morphological studies revealed that both the Diacerein treatments significantly reduced joint swelling as compared to the untreated group. The serum TNF-α and IL-1β levels were significantly lower in both Diacerein treatment groups as compared to the untreated group throughout the course of the study. Histological and radiological findings confirmed that transdermal Diacerein treatment protects against cartilage degradation like oral treatment. Conclusion: Novasomal technology proved its efficacy as a carrier for the transdermal delivery of Diacerein. The in-vivo study on an animal model of osteoarthritis showed that Diacerein transdermal gels provided sufficient pharmacological activity for the attenuation of the disease. This finding could support its use as an alternative to the standard oral treatment to avoid side effects.
Data generated from modern applications and the internet in healthcare is extensive and rapidly expanding. Therefore, one of the significant success factors for any application is understanding and extracting meaningful information using digital analytics tools. These tools will positively impact the application's performance and handle the challenges that can be faced to create highly consistent, logical, and information-rich summaries. This paper contains three main objectives: First, it provides several analytics methodologies that help to analyze datasets and extract useful information from them as preprocessing steps in any classification model to determine the dataset characteristics. Also, this paper provides a comparative st
... Show MoreThe competition in the hotel sector, globalization and the development of new information have forced the sector to continuously seek new techniques and arrangements to remain competitive through hotel industry companies, including Benchmarking and the application of this method in the hotel sector. The selection of the Rashid International Hotel by the Ministry of Tourism as a leading hotel or benchmark for comparison of other hotels in Iraq, and the selection of two hotels in Baghdad for comparison, namely (Ishtar International Hotel, Baghdad International Hotel) and the choice also by the Ministry of Tourism, N is to correct the course of practice to manage the cost and diagnosis of the weakness of the strengths and weaknesses in the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More1-Objective:- Polyphenols are biochemical compounds with antioxidant activity against differences diseases related to Lipid peroxidation such as diabetes mellitus. Polyphenols distributed widely in medical plants, the aim of the study is to extract and analyze some polyphenolic compounds from grape seeds and examine their effects on (STZ) induced diabetic mice. 2-Methods:- In the present study , a group of polyphenols has been extracted from Iraq
... Show MoreBackground: Oral squamous cell carcinoma represents the vast majority of oral cancer it is a common malignant tumor with an increasing incidence. Around the world, the 5 year mortality rate of oral cancer is about 50%. Thus novel biomarkers for early detection oral squamous cell carcinoma are needed. The level of three salivary microRNAs namely hsa-miR-200a, hsa-miR-125a and hsa- miR-93 were measured in saliva of patients with oral squamous cell carcinoma and compared their levels in saliva of healthy control subjects to determine their potential as oral cancer biomarker. Materials and methods: The level of these three microRNAs was measured by using revers transcription, preamplification and quantitative PCR. Results: Only miR-200a presen
... Show MoreBackground: Several risk managem-ent standards had been developed including the Project Management Institute, the National Institute of Standards and Technology, actuarial societies, and ISO standards.
Objective: The study aimed at evaluating risk management among managers of model and ordinary primary health care centers in Baghdad City and comparing the risk management among these centers.
Methods: A descriptive comparative des
... Show MoreThe research work is "The passive voice as a grammatical phenomenon in four selected textbooks". The research deals with the grammatical phenomenon passive in German. The research consists of two parts, the theoretical and the empirical part. The present research work is divided into 3 sections:
The first section includes the definition of passive, passive types, process passive, state passive, passive with modal verbs, and other types of passive. The second section provides illustrations of the four selected textbooks. The third chapter presents the passive voice in textbooks, namely German language teaching for foreigners by Dora Schulz and Heinz Griesbach, Delfin von Aufderstrasse H. and others, Em von Balme, M. and others and
... Show MoreNowadays, many new technologies developed in a lot of countries. These technologies are promising in many areas such as environmental monitoring, precision agriculture as well as in animal production. The purpose of this study was to define a better understanding of how new and advanced technologies affect the agriculture and livestock sector alike. Although agriculture and animal husbandry are among the most important sectors, advanced equipment and information technology cannot be used adequately. This situation leads to low production efficiency. It is also known that there can be a significant difference in temperature between the position of the climate control sensor (room temperature) and the area occupied by the animal. This study e
... Show More