Many reports confirm ulcers as an adverse effect of drugs such as nicorandil and aspirin. The exact responsible mechanisms of ulceration have until now not proved. Mucosal ulcers associated with the onset of ulcer are manifested by an increase in proinflammatory cytokine, excessive prostaglandin, and up-regulation of Endothilin-1 level, which directly impacts the release of leptin. These, released locally within mucosal tissues, have played a role in controlling the extent of local inflammatory responses and processes of mucosal repair.
This study was designed to find out the correlation of plasma leptin and prostaglandin levels as a possible mechanism of oral ulcer formation as an adverse effect of nicorandil. The effect of nicorandil for inducing ulceration was assessed. The plasma leptin and prostaglandin E2 for the tested groups in relation to the studied parameters (gender, and daily body weight change) were estimated in albino rats.
Nicorandil causes mucous membrane damage, inflammation, and ulceration. A significant reduction of plasma leptin level, which was dose-dependent, and a non-significant reduction of serum prostaglandin E2 level. The mechanisms of ulcer induction as an adverse effect of nicorandil can be related to dose-dependant leptin and prostaglandin E2 levels, which affects on repair and healing process.
Keywords: Nicorandil, Leptin, Prostaglandin E2, Ulcer.
Cloud computing is a pay-as-you-go model that provides users with on-demand access to services or computing resources. It is a challenging issue to maximize the service provider's profit and, on the other hand, meet the Quality of Service (QoS) requirements of users. Therefore, this paper proposes an admission control heuristic (ACH) approach that selects or rejects the requests based on budget, deadline, and penalty cost, i.e., those given by the user. Then a service level agreement (SLA) is created for each selected request. The proposed work uses Particle Swarm Optimization (PSO) and the Salp Swarm Algorithm (SSA) to schedule the selected requests under budget and deadline constraints. Performances of PSO and SSA with and witho
... Show MoreThis study aims to figure out how to calculate water recharge using the soil conservation service method, one of the most widely used methods for calculating runoff volume following rainfall. The research is being conducted in Ameriat Al-Falluja City, Al-Anbar Governorate. The Iraqi meteorological organization's Baghdad Airport and Al-Ramadi stations provided data on the research area from 1989 to 2020 as total annual rainfall (123.1 mm), the RH% (43%), the mean monthly T (23.6 °C), total evaporation (3169.61 mm), the wind speed (3.1 m/s), and the sunshine duration (9 h/day). The climate of the study area is described as arid. The total evapotranspiration value quantity is 1137.38 mm for the 32-year comparison period, while the
... Show MoreThis study deals with the interpretation of structural 3D seismic reflection of the Kumait oil field in southern Iraq within the administrative boundaries of the Maysan Governorate. Synthetic seismograms are prepared by using available data of the Kt-1 oil field by using Petrel software to define and pick the reflector on the seismic section of the Zubair Formation, Which represents the Cretaceous Age. The study shows that the Kumait structure is an anticline fold. It is thought to be a structure trap caused by the collision of the Arabian and Iranian plates and trending in the same direction as driving factors in the area, which are from the northwest to the southeast, and the overall trend of strata is north and northeast. Sei
... Show MoreThe use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreA novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreIn this paper, the bowtie method was utilized by a multidisciplinary team in the Federal Board of Supreme Audit (FBSA)for the purpose of managing corruption risks threatening the Iraqi construction sector. Corruption in Iraq is a widespread phenomenon that threatens to degrade society and halt the wheel of economic development, so it must be reduced through appropriate strategies. A total of eleven corruption risks have been identified by the involved parties in corruption and were analyzed by using probability and impact matrix and their priority has been ranked. Bowtie analysis was conducted on four factors with high score risk in causing corruption in the planning stage. The number and effectiveness of the existing proactive meas
... Show More