Preferred Language
Articles
/
axcwaY8BVTCNdQwCy3eD
Effects of Pregabalin Drug on Level of Reproductive Hormones, Sexual Activity, Number and Weight of Offspring in Female Albino Rats
...Show More Authors

Abstract: This study was aimed to investigate the effect of two doses of pregabalin (PGB) on hormonal level and sexual activity in female albino rats. Ninety female rats with age (9-10 weeks) and weight (200±20 g) were divided into three major groups of thirty rats. First group was considered as control G1, the second G2 and third G3 groups were exposed to PGB into two doses 150, and 300 mg/kg body weight per day respectively. Each major group was divided into three subgroups (subgroup A, B, and C of each has ten rats), the treatments last for one month for subgroup A, two months for subgroup B, and three months for subgroup C. Five rats from each subgroup were placed separately into two breeding cages with two isolated males and waiting the pregnancy and then delivery. Blood samples were collected from other five rats in each subgroup by heart puncture technique for hormonal assessment, The results showed a significant (P≤0.05) decrease in the levels of luteinizing hormone (LH), follicular stimulating hormone (FSH), and prolactin hormone (PRL) in treated groups (G2 and G3), when compared to the control group . A significant (P≤0.05) increase in the levels of testosterone, estradiol, and progesterone was observed in the serum of treated groups (G2 and G3), when compared to control rats (G1).The results showed a significant (P≤0.05) delay in the delivery of the offspring in (G2 and G3) groups as compared with control (G1). There was a significant (P≤0.05) decrease in the number and weights of offspring in the treated rats (G2 and G3), as compared to the number and weights of offspring of the control groups (G1).

Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 14 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Impact of MDR-1 Gene Polymorphism (rs1128503) on Response to Imatinib or Nilotinib in Iraqi Patients with Chronic Myeloid Leukemia: An Observational Study
...Show More Authors

Background: There is a significant molecular response to imatinib given at standard doses in individuals with chronic myeloid leukemia (CML) whose ABCB1 polymorphisms are present. Objective: To investigate the impact of the polymorphism in the ABCB1 gene rs1128503 on the effectiveness of nilotinib or imatinib therapy. Methods: From May 2022 until the end of January 2023, the current study was carried out in a single research institution, the National Center of Hematology, Baghdad Teaching Hospital at Medical City, Iraq. 76 people with chronic phase myeloid leukemia (CML-CP), who had previously received a diagnosis using the European Leukemia Net (ELN) criteria, enrolled in the trial. The PCR product was delivered to Macrogen Corpora

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
Plos One
Healthy lifestyle behaviors are major predictors of mental wellbeing during COVID-19 pandemic confinement: A study on adult Arabs in higher educational institutions
...Show More Authors
Background

In the past infectious diseases affected the quality of lifestyle during home confinement. The study conducted examines the influence of home confinement during the COVID-19 pandemic outbreak on lifestyle, mental wellbeing, nutritional status, and sleeping pattern.

Method

An online multicategorical questionnaire was distributed to collect demographic information combined with the following tools: Food Frequency Questionnaire (FFQ), International Physical Activity Questionnaire (IPAQ), WHO-5 wellbeing score, and Pittsburgh Sleep Quality Index (PSQI). A snowball non-discriminate sampling procedure was

... Show More
View Publication Preview PDF
Scopus (67)
Crossref (51)
Scopus Clarivate Crossref
Publication Date
Sun Sep 27 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Educational Program on Nurses Knowledge toward Nursing Management for Patients Undergoing Percutaneous Coronary Intervention in Cardiac Center at Al-Dewaniyah City
...Show More Authors

Objectives: The study aims to evaluate the effectiveness of the educational program on nurses’ knowledge towards nursing management for patients undergoing percutaneous coronary intervention (PCI), as well as to find out the relationship between nurses' knowledge and some of their demographic characteristics (age, gender, level of education, and years of experience in cardiac units).

Methodology:  A Quasi-experimental as one group (pre and post test) study was conducted at the Heart Center in Al-Diwaniyah city for the period from December 7, 2019 to February 23, 2020. A sample of (40) nurses working in the heart center was chosen from different nursing addresses. The sample covered one gro

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Strategic leadership and It's Impact on Achieving The Organizational Reputation
...Show More Authors

Abstract :

This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Research Journal Of Pharmacy And Technology
Bacteriological and molecular study on S. Aureus bacteria Atala, M.L.
...Show More Authors

Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref