Fumonisin B1 (FB1) is a mycotoxin produced in some grains (mainly corn) by Fusarium species. Due to a structural similarity between FB1 and sphinganine, sphingolipids metabolism is inhibited. Such inhibition plays a critical role in cell to cell singling and structure of lipoprotein; therefore FB1 has been suggested to have a relationship with human and animal cancer. This research is planned to study the effect of FB1 on male mice at two doses (20 and 30 µg/ ml) on the expression of TGF-β1 and p16 in liver cells. Three groups of Swiss albino male mice; each group was orally administrated with FB1 toxin as the following: normal saline (control group); 20 and 30 µg/ ml. All groups were sacrificed after two weeks of oral management. Liver samples were collected and prepared for immunohistochemistry technique (IHC) using anti-TGF-β1 and anti-p16 antibodies. The results showed that exposure to FB1 caused significant elevation of TGF-β1 in both doses (76.74 ± 2.387% and 80.62 ± 7.277%, respectively) in comparison with the control group (46.79 ± 2.404%). The level of p16 protein was decreased at 20 µg/ml (76.63 ± 2.349%) and then increased at 30 µg/ml (81.25 ± 6.263%) but the expression was lower than that of control (90.00 ± 0.805%). In conclusion, FB1 has a significant effect on TGF-β1 and p16 protein expression at both doses (20 and 30 µg/ml), and therefore, its role in cancer development is suggested.
A vector in a separable infinite dimensional Hilbert space is called disk-cyclic for bounded operator if the orbit α : 0, α∈;|∝| 1is dense in. The useful tool used to discover codisk-cyclic operation is called the disk-cyclic Criterion. In this paper we will show that some equivalent conditions of the
Background: Medical-surgical nurses are responsible of providing competent care to clients with a wide-array of acute and chronic health problems. This challenging task requires arming nurses with advanced competencies of health literacy to effectively educate their clients. However, evidence about medical-surgical nurse’s health literacy-related knowledge and experience is limited. Purposes: This study aimed to determine the level of the health literacy-related knowledge and experience among medical-surgical nurses.Design: A descriptive-cross-sectional study was conducted among a total sample of 177 nurses who were practicing in medical-surgical wards in teaching hospitals in Iraq. A convenience sampling method was used to sele
... Show MoreThis article is devoted to the cognitive study of ironic metonymy in Russian and Arabic. Metonymy and irony have traditionally been seen as parallel linguistic phenomena. But their formation and interpretation are based on different cognitive mechanisms. At the formal and functional level, metonymy and irony have a number of significant differences. Metonymy is an artistic technique, the mechanism of which is based on obvious, easily traced connections between objects and phenomena of the surrounding world. Irony is a satirical technique or a rhetorical figure that is used to create a certain artistic image, aimed at forming the hidden meaning of the statement. A native speaker intuitively feels the difference between metonymy and irony
... Show MoreModeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in
... Show MoreThe study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show MoreBackground: since December 2019, China and in particularly Wuhan, faced an unprecedented an outbreak challenge of coronavirus disease 2019, caused by the severe acute respiratory syndrome coronavirus 2. Clinical characteristics of Iraqi patients with COVID-19 and risk factors for mortality needed to be shared with the health care providers to improve the overall disease experience. Methods: prospective, single-center study recruited patients with confirmed SARS-CoV-2 infection who were admitted to Al-Shifaa Isolation Center / Baghdad Medical City between the mid of March and the end of April 2020 until had been discharged or had died. Demographic data, information on clinical signs, symptoms, at presentation, treatment, have been collected
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More