Cyclophosphamide is chemotherapeutic agent that utilized for the treatment of different malignancies; however its’ used associated with numerous adverse effects. Vitamin B2 and vitamin B12 suggested having myeloprotective effect. This work is designed to investigate the myeloprotective effect of both vitamins against cyclophosphamide induced myelosuppression. One hundred adult rats of both sexes were used in this study. The animals were randomly enrolled into ten groups of 10 rats each. Group I: Control group. Group II: Cyclophosphamide-treated. Group III and Group IV Orally-administered vitamin B2 (10, and 40 mg/kg/day), respectively alone for 7 days. Group V: Orally-administered vitamin B12 (0.1 mg/kg/day) alone for 7 days. Group VI and Group VII: Orally-administered vitamin B2 (10, and 40 mg/kg/day), respectively for 7 days and a single IP injection of cyclophosphamide (150 mg/kg) at day 7.Group VIII: Orally-administered vitamin B12 (0.1 mg/kg/day) for 7 days and a single IP injection of cyclophosphamide (150 mg/kg) at day 7. Group IX: Orally-administered a combination of vitamin B2 (10 mg/kg/day) and vitamin B12 (0.1 mg/kg/day) for 7 days and a single IP injection of cyclophosphamide (150 mg/kg) at day 7. Group X: orally-administered a combination of vitamin B2 (40 mg/kg/day) and vitamin B12 (0.1 mg/kg/day) for 7 days and a single IP injection of cyclophosphamide (150 mg/kg) at day 7. On day eight, animals were sacrificed and blood collected for CBCs and femur bone were extracted for bone marrow histological examination. Vitamin B2 and vitamin B12 significantly (P<0.05) increase CBCs; and the combination of vitamins produce -a significant (P<0.05) increase in CBCs compared to corresponding counts in other Groups, and -improve histopathological changes compared to Group II rats. In conclusion both vitamins may have myeloprotective effects against cyclophosphamide-induced myelosuppression.
This study includes a physiochemical and a spectrocpical characterization to some alkaloid compounds in the (ANAB AL- THEAB) plant (Solanum nigrun L.). It’s the most important medicinal herb belonging to the family (Solanaceae). Acid hydrolysis was performed by using limited conc. of Hcl and H2SO4, to obtain the aglycon part of previously separated steroidal componants as (A, B and C). The characterization of the(A,B and C) compounds indicates that they varied between them as the separated steroidal like-alkaloids, carried by using melting point (m.p.), thin layer chromatography (TLC), Infra -Red spectroscopy (IR) and Ultra violet-Visible spectroscopy (UV - Visible).High perfor
... Show MoreBootstrap is one of an important re-sampling technique which has given the attention of researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con
... Show MoreOpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThis research aims to predict new COVID-19 cases in Bandung, Indonesia. The system implemented two types of deep learning methods to predict this. They were the recurrent neural networks (RNN) and long-short-term memory (LSTM) algorithms. The data used in this study were the numbers of confirmed COVID-19 cases in Bandung from March 2020 to December 2020. Pre-processing of the data was carried out, namely data splitting and scaling, to get optimal results. During model training, the hyperparameter tuning stage was carried out on the sequence length and the number of layers. The results showed that RNN gave a better performance. The test used the RMSE, MAE, and R2 evaluation methods, with the best numbers being 0.66975075, 0.470
... Show MorePrediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressur
... Show MoreIn this research, the influence of the orientation and distance factors on the lowest usable frequency (LUF) parameter has been studied theoretically. The calculations of the (LUF) parameter have been made using the (VOACAP) international communication model for the connection links between the capital Baghdad and many other locations that distributed on different distances and directions over the Middle East region. The results shown in this study indicate there is a slight affection of the link direction (orientation) on the LUF parameter, while the influence of the distance factor is more significant on the values of the LUF parameter. The day/night effect appears for the long distance HF links (i.e. more than a 500 Km)
<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show More