Fumonisin B1 (FB1) is a mycotoxin produced in some grains (mainly corn) by Fusarium species. Due to a structural similarity between FB1 and sphinganine, sphingolipids metabolism is inhibited. Such inhibition plays a critical role in cell to cell singling and structure of lipoprotein; therefore FB1 has been suggested to have a relationship with human and animal cancer. This research is planned to study the effect of FB1 on male mice at two doses (20 and 30 µg/ ml) on the expression of TGF-β1 and p16 in liver cells. Three groups of Swiss albino male mice; each group was orally administrated with FB1 toxin as the following: normal saline (control group); 20 and 30 µg/ ml. All groups were sacrificed after two weeks of oral management. Liver samples were collected and prepared for immunohistochemistry technique (IHC) using anti-TGF-β1 and anti-p16 antibodies. The results showed that exposure to FB1 caused significant elevation of TGF-β1 in both doses (76.74 ± 2.387% and 80.62 ± 7.277%, respectively) in comparison with the control group (46.79 ± 2.404%). The level of p16 protein was decreased at 20 µg/ml (76.63 ± 2.349%) and then increased at 30 µg/ml (81.25 ± 6.263%) but the expression was lower than that of control (90.00 ± 0.805%). In conclusion, FB1 has a significant effect on TGF-β1 and p16 protein expression at both doses (20 and 30 µg/ml), and therefore, its role in cancer development is suggested.
In this paper, we introduce the concept of s.p-semisimple module. Let S be a semiradical property, we say that a module M is s.p - semisimple if for every submodule N of M, there exists a direct summand K of M such that K ≤ N and N / K has S. we prove that a module M is s.p - semisimple module if and only if for every submodule A of M, there exists a direct summand B of M such that A = B + C and C has S. Also, we prove that for a module M is s.p - semisimple if and only if for every submodule A of M, there exists an idempotent e ∊ End(M) such that e(M) ≤ A and (1- e)(A) has S.
The first thing that comes to mind is the highly important question of whether there were some effects of human behavior and its fluctuations on the theories of the efficient market and the contemporary investment portfolio. According to what has been said by the proponents of these two theories; when the optimal return is realized, the efficiency of the market is achieved in terms of perfect information on prices and risk that supposed to be predetermined in a rational way.
he other question that imposed here is “at what time people should be rational in their investments in the security markets ?”. This means that investors are rational for their efforts devoted to utility maximization, which are p
... Show MoreThe aim of the study is to identify the barriers to dietary compliance among diabetic patients.
Methodology: The sample of the study consist of 100 patients who were divided into two groups according to
the type of diabetes mellitus; type 1 (Insulin-dependent diabetic mellitus), and type n (Non-Insulin dependent
diabetes mellitus). Each group consists of 50 patient selected randomly at each visit to Al-Waffa center in Mosul
city during the period from (1-12-2005) to (1-2-2006).
The steps of the study include recording the different barriers for diabetic patients. The questionnaire
was used and special list was utilized for such purpose.
Results: The results shows that there were some barriers most common such as both
In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
The huge evolving in the information technologies, especially in the few last decades, has produced an increase in the volume of data on the World Wide Web, which is still growing significantly. Retrieving the relevant information on the Internet or any data source with a query created by a few words has become a big challenge. To override this, query expansion (QE) has an important function in improving the information retrieval (IR), where the original query of user is recreated to a new query by appending new related terms with the same importance. One of the problems of query expansion is the choosing of suitable terms. This problem leads to another challenge of how to retrieve the important documents with high precision, high recall
... Show MoreThe husband’s discipline of his wife is a right prescribed by the Sharia, but it is conditioned discipline with conditions that make this discipline intended to preserve the family institution from disintegration and scattering, so the Islamic Sharia entrusted the husband, the guardian of the family, with the task of disciplining the disobedient and disobedient wife and deviating from the family’s values and constants of mutual respect and obedience in what is good. And a sense of responsibility. This discipline goes through three sequential stages, starting with exhortation and dialogue, passing through abandonment in the beds, and ending with beating. As for the sermon, it is a quiet dialogue followed by a threat of abandonme
... Show MoreDue to the popularity of radar, receivers often “hear” a great number of other transmitters in
addition to their own return merely in noise. The dealing with the problem of identifying and/or
separating a sum of tens of such pulse trains from a number of different sources are often received on
the one communication channel. It is then of interest to identify which pulses are from which source,
based on the assumption that the different sources have different characteristics. This search deals with a
graphical user interface (GUI) to generate the radar pulse in order to use the required radar signal in any
specified location.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreTarget costing is one of the modern techniques in strategic Management accounting, Is has shown active adoption to changes in current business environments, In addition, is has seen a growth in strategic approach, The goal of using target costing is to build and strengthen competition abilities of economic units through introducing appropriate ways to decrease cost values while maintaining and improving quality of product, So this study is aim to show how can economic units use target costing to achieve competitive advantages .
Owing to their remarkable characteristics, refractory molybdenum nitride (MoNx)-based compounds have been deployed in a wide range of strategic industrial applications. This review reports the electronic and structural properties that render MoNx materials as potent catalytic surfaces for numerous chemical reactions and surveys the syntheses, procedures, and catalytic applications in pertinent industries such as the petroleum industry. In particular, hydrogenation, hydrodesulfurization, and hydrodeoxygenation are essential processes in the refinement of oil segments and their conversions into commodity fuels and platform chemicals. N-vacant sites over a catalyst’s surface are a significant driver of diverse chemical phenomena. Studies on
... Show More