The purpose of this research was to investigate the beneficial effects of phosphatidylcholine in reducing changes in both lipid and protein profiles in addition to atherogenic index in adult rats with fructose-induced metabolic syndrome. Thirty-six mature Wistar Albino female rats (Rattus norvegicus) (aged 12-15 weeks and weighing 200±10 g) were divided randomly into four groups (G1, G2, G3, and G4); then variable treatments were orally administered for 62 days as follows: G1 (Control group), received distilled water; G2, treated with phosphatidylcholine (PC) orally (1 g/kg BW); G3 (Fr), orally dosed with 40% fructose and 25% fructose mixed with drinking water; G4 (Fr+PC), were also intubated with 40% fructose and 25% fructose in drinking water, and received PC at 1 g/kg BW by oral tube. At the end of the research, specimens were taken by cardio puncture approach after fasting for 8-12 h. Serum was obtained to measure lipid criteria (total serum cholesterol, triacylglycerol, high-density lipoprotein-cholesterol, low-density lipoprotein-cholesterol, very low-density lipoprotein-cholesterol, non-high-density lipoprotein-cholesterol, and Atherogenic index) and protein profile (total protein, albumin, and globulins). The results showed that the occurrence of dyslipidaemia (hypercholesterolemia, triacyleglycerolemia) increase in low density of lipoprotein-cholesterol, very low-density lipoprotein-cholesterol, no-high density lipoprotein-cholesterol concentrations and atherogenic index and reduce the concentration of high-density lipoprotein-cholesterol) in fructose treated animals in addition to disturbance in protein profile (lowered in total protein and globulins level).PC treatment resulted in decreased changes in lipid profile, protein profile, and atherogenic index in rats, whereas fructose induced metabolic syndrome. In conclusion, using Phosphatidylcholine treatment in rats may reduce the changes of lipid and protein profiles and atherogenic index while fructose may lead to metabolic syndrome.
:
While practicing of International business particularly that centered on foreign direct investment, let on one side, to achieving objectives of transnational corporations specially that represented in continuous pursue to improving its cash flows and maximization of stockholders wealth which is considered the most important objective to the transnational corporations, but in the same time its lead, on other side, to increasing the foreign exchange risk exposuring these corporations. So, the transnational corporations (TNCs) struggling to make strategies which are dealing in smart way, with this risk and its management in way that enable to avoiding risk comple
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreHigh frequency (HF) communications have an important role in long distances wireless communications. This frequency band is more important than VHF and UHF, as HF frequencies can cut longer distance with a single hopping. It has a low operation cost because it offers over-the-horizon communications without repeaters, therefore it can be used as a backup for satellite communications in emergency conditions. One of the main problems in HF communications is the prediction of the propagation direction and the frequency of optimum transmission (FOT) that must be used at a certain time. This paper introduces a new technique based on Oblique Ionosonde Station (OIS) to overcome this problem with a low cost and an easier way. This technique uses the
... Show MoreA Multiple System Biometric System Based on ECG Data
Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MorePassword authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
The main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and
In this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.
... Show More