The aim of study to evaluated cinnamic acid and its activity on complete blood count(RBC,WBC,HG,HCV,MCH,MCHC and Plat.)and removed the cytoxan damage which caused bone marrow failure and leukemia and other that due to linked the cytoxan in 7- nitrogen of guanine based of DNA that lead to dead cells. Two concentration from pure cinnamic acid (5.6, 2.8 mg ? mice weight) in first step to choice the perfect concentration in comparison with each negative control ,positive control of cytoxan and the comparison group represent vitamin C. The second step to understand cinnamic acid mechanism activity towards cytoxan by used pre- cytoxan and post – cytoxan in interaction with perfect concentration of cinnamic acid dose (2.8 mg ? mice weight).The analysis showed that cinnamic acid removed each kinds of anemia ,leukemia, bone marrow failure, hypoxia, cancer chemotherapy, hemolytic anemia and hormone erythropoietin from kidney failure in post-cytoxan than pre-cytoxan perfectly ,therefore, cinnamic acid has cure ability and removed cytoxan damage and can give to patient whom used cytoxan in transplanting body part surgeries to a void refused the part for 6 days after transplanting surgeries.
Ifosfamide (IFO), an alkylating chemotherapy agent, is known for its association with neurotoxicity and encephalopathy. This trial was designed to evaluate the protective action of daidzein (DZN) against IFO-induced neurotoxicity in male rats by determining the difference in certain inflammatory and apoptotic markers in the brain tissue of rats. Twenty-eight Wistar rats, weighing 120-150 g, were divided into four groups of seven rats: Group 1 (Control) received no treatment; Group 2 was orally administered DZN (100 mg/kg/day) for seven days; Group 3 received a single intraperitoneal (IP) dose of IFO (500 mg/kg); Group 4 received oral DZN (100 mg/kg/day) for one week prior to a single IP dose of IFO on the seventh day. Twenty-four hours post
... Show MoreCommunity detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo
... Show MoreThis paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show MoreThe study aimed to investigate the effect of fungicides chlorothalonil at different concentrations ( 0.1 , 0.5 , 5 , 25 , 50 ) × 10 - 5 M on some cytogenetic parameters of human peripheral blood lymphocytes . The genotoxicity parameters were estimated by the number of chromosomal aberrations (CAs) and their types and by estimating the induced micronuclei (Mn) . Cytotoxic effect recorded by estimating the mitotic index (MI) . Results revealed that the fungicide increased the CAs in dose – response pattern with positive correlation coefficient ( r = + 0.964) , there was a significant differences among the concentrations (P<0.01) . The major CAs records chromosomal breakage at concentrations. 0.5 , 5 , 25 , and 50 , while the lowest concen
... Show MoreThe reaction of starting materials (L-asCl2):bis[O,O-2,3;O,O-5,6-(chloro(carboxylic) methylidene)]- -L-ascorbic acid] with glycine gives new product bis[O,O-2,3,O,O-5,6-(N,O-di carboxylic methylidene N-glycine)-L-ascorbic acid] (L-as-gly) which is isolated and characterized by, Mass spectrum UV-visible and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the (L-as-gly) with M+2; Co(II) Ni(II) Cu(II) and Zn(II) has been characterized by FT- IR , Uv-Visible , electrical conductivity, magnetic susceptibility methods and atomic absorption and molar ratio . The analysis showed that the ligand coordinate with metal ions through mono dentate carboxylic resulting in six-coordinated with Co(II) Ni(II) Cu(II) ions while with
... Show MoreKinetic and mechanism studies of the oxidation of oxalic acid by Cerium sulphate have been carried out in acid medium sulphuric acid. The uv- vis. Spectrophotometric technique was used to follow up the reaction and the selected wavelength to be followed was 320 nm. The kinetic study showed that the order of reaction is first order in Ce(IV) and fractional in oxalic acid. The effect of using different concentration of sulphuric acid on the rate of the reaction has been studied a and it was found that the rate decreased with increasing the acid concentration. Classical organic tests was used to identify the product of the oxidation reaction, the product was just bubbles of CO2.
AASAH Enass J Waheed, Shatha MH Obaid, Research Journal of Pharmaceutical, Biological and Chemical Sciences, 2019 - Cited by 5
Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,
... Show More