Preferred Language
Articles
/
bijps-888
Effects of Hydrochlorothiazide on Tenofovir Disoproxil Fumarate-Induced Nephrotoxicity in Rats
...Show More Authors

Tenofovir disoproxil fumarate, a nucleotide reverse transcriptase inhibitor utilized for the treatment of hepatitis B virus and human immunodeficiency virus infections; and is now one of the most widely used antiretroviral drug. However, tenofovir disoproxil fumarate can induce nephrotoxicity, which may be attributed to the interaction between such drug and the organic anion transporters (hOAT1, and OAT3) with consequent changes in levels of some parameters that may have a role in nephrotoxicity. Thiazide diuretics have high to intermediate potency of inhibition of OAT1s and OAT3; thus, it may possess nephroprotective effects. This study was designed to investigate whether hydrochlorthiazide has nephroprotective effects on tenofovir disoproxil fumarate-induced nephrotoxicity in rats.

Twenty eight healthy adult male albino rats weighing 180-200g were utilized in this study for duration of 5weeks (35 days) treatment. Rats were randomly divided into four groups (7animals each). Group I: Negative control (orally given distilled water) by gavage tube; Group II: Rats orally received 600 mg/kg/day tenofovir disoproxil fumarate by gavage tube; Group III: Rats orally administered hydrochlorothiazide alone at a dose (10 mg/kg/day) by gavage tube, and Group IV: Rats orally administered hydrochlorothiazide at a dose (10 mg/kg/day) plus tenofovir disoproxil fumarate 600 mg/kg/day by gavage tube. On day 36 of the study, after euthanization of each animal by diethyl ether, 3-5ml of blood samples were collected from each rat by an intra-cardiac puncture, then centrifuged at 3000 rpm for 15 minutes to obtain serum, which was then transferred into suitable plain tubes and preserved at -20 °C; and it was utilized for the estimation of cystatin C and IL-10 level.

Rats administered tenofovir disoproxil fumarate for 5 weeks (group II) produced a significant -elevation (P<0.05) in serum cystatin C level and –reduction in serum IL-10 levels compared to negative control group (group I); similarly,  administration of hydrochlorothiazide alone to rats (group III) produced a significant -elevation (P<0.05) in serum cystatin C level and –reduction in serum IL-10 levels compared to negative control group (group I); also, rats administered combination of hydrochlorothiazide plus tenofovir disoproxil fumarate to rats for 5 weeks (group IV) produced significant elevation (P<0.05) in serum level of cystatin C, and a significant reduction (P<0.05) in IL-10 serum level in treated rats compared to the corresponding levels of negative control animals (group I); beside that in (group IV) rats there were significant reduction (P<0.05) in serum level of both cystatin C, and IL-10 in treated rats compared to the corresponding levels compared to TDF-treated (group II). In conclusion, treatment with hydrochlorthiazide plus tenofovir disoproxil fumarate in an attempt to prevent nephrotoxicity induced by tenofovir disoproxil fumarate is not attained.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Tikrit University For Humanities
The Egyptian-Chinese Consensus at the Bandung Conference and Its Impact on Strengthening Relations between Them in 1955
...Show More Authors

كان المؤتمر الآسيوي الأفريقي الأول الذي عُقد في مدينة باندونغ الاندونيسية عام 1955 هو المؤتمر هو الأول الذي اجتمعت فيه الدول الآسيوية والأفريقية بعد الحرب العالمية الثانية. كان مؤتمر باندونغ بمثابة نقطة الانطلاق نحو تأسيس حركة عدم الانحياز، والتي كانت مصر أحد أبرز أقطابها. شهد المؤتمر تقاربا في الآراء ووجهات النظر بين جمهورية مصر العربية وجمهورية الصين الشعبية، لا سيّما وإن الحكومة المصرية كانت قد تبنت س

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
Al-kindy College Medical Journal
Microbiological and Molecular study On Candida species Isolated From Catheterized ur ine specimen In Ramadi general Teaching Hospital
...Show More Authors

Background: A Catheter-associated with candidiasis infection is the most common nosocomial infection and the objective of this work is to isolate and identify Candida species from catheterized patients by ordinary culture and PCR.Objective:To study the isolation and identification of Candida species from catheterized patients by culture media and polymerase chain reaction(PCR).Methods: One hundred and thirty five Candida species isolates were obtained from urine culture of catheterized specimens from male and female patients , During the period between October 2011 to April 2012 , attending AL-Ramadi general teaching Hospital. A quantitative urine culture for isolation and identification of Candida species was. The isolation of Candida s

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 23 2025
Journal Name
Journal Of Craniofacial Surgery
Gender Determination in Forensic Dentistry Using Bonwill’s Triangle Measurements From CBCT Scans: A Study on the Iraqi Population
...Show More Authors
Background:

The purpose of this study is to illuminate the role of CBCT in forensic dentistry through variations of mandibular measurements of Bonwill’s triangles in gender determination among the Iraqi population.

Materials and methods:

In this retrospective study 70 CBCT scans were analyzed to measure the Bonwill’s triangle, 35 for males and 35 for females aged between 20 and 50 years, all data were collected at the oral and maxillofacial radiology department in Ghazi AL-Hariri hospital for 3 months, and the data were obtained using a Kavo CBCT device (3D On De

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Efficient Task Scheduling Approach in Edge-Cloud Continuum based on Flower Pollination and Improved Shuffled Frog Leaping Algorithm
...Show More Authors

The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Laminar Free Convection In Horizontal Annulus Filled With Glass Beads And With Annular Fins On The Inner Cylinder
...Show More Authors

An experimental and numerical study has been carried out to investigate the heat transfer by natural convection and radiation in a two dimensional annulus enclosure filled with porous media (glass beads) between two horizontal concentric cylinders. The outer cylinders are of (100, 82 and70mm) outside diameters and the inner cylinder of 27 mm outside diameter with (or without) annular fins attached to it. Under steady state condition; the inner cylinder surface is maintained at a high temperature by applying a uniform heat flux and the outer cylinder surface at a low temperature inside a freezer. The experiments were carried out for an annulus filled with
glass beads at a range of modified Rayleigh number (4.9 ≤ Ra≤ 69), radiation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
IoT System on Dynamic Fish Feeder Based on Fish Existence for Agriculture Aquaponic Breeders
...Show More Authors

Maintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
A Comparative Study on Association Rule Mining Algorithms on the Hospital Infection Control Dataset
...Show More Authors

Administrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref