Endothelin-1 (ET-1) is a potent vasoconstrictor hormone that has been identified as an important factor
responsible for the development of cardiovascular dysfunctions. ET-1 exerts its vasoconstrictor activity
through two pharmacologically distinct receptors, ETA and ETB that are found in vascular smooth muscle
cells (VSMCs) and the vasodilator activity through an ETB receptor located on endothelial cells. This study
aimed to show the impact of 1µM L-arginine (LA), 100µM tetrahydrobiopterin (BH4), and their combined
effect on ET-1 activity in both lead-treated and lead-untreated rat aortic rings. This means, investigating how
endothelial dysfunction reverses the role of nitric oxide precursor and cofactor. In this study, Rat aortic rings
have been pre-incubated with BH4, LA and their combination. Subsequently, the aortic rings were preincubated with 200µM N-Nitro-L-arginine methyl ester (L-NAME) and 0.5µM BQ-123. Then, the vascular
response to cumulative doses of rat ET-1 was analyzed in each of the above-mentioned groups (LA, BH4, LA
& BH4, L-NAME, BQ-123), in the presence and absence of lead acetate 1µM Pb (C2H3O2)2. ET-1 efficacy and
potency were significantly decreased in the presence of LA, BH4, and LA and BH4 combination in the untreated
group, while it significantly increased in the presence of lead. In the second trial of experiments ET-1 efficacy
markedly decreased in BQ-123- incubated cells in both lead-treated and untreated aortic rings. In the presence
of lead, the efficacy of ET-1 was raised with the use of L-NAME. In conclusion, LA and BH4 can be considered
pharmacological agents to alter the potency of ET-1-induced vasoconstriction and concomitantly lower blood
pressure.
Abstract
The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.
It may say that of difference towards a state that had witnessed the birth of modern party system in England ،and it appear a new case of organization and use ways effecting in general opinion through the election parties that had different in their ideology as Alweel party which dealt with religion related among its members with Buretan with its members participation understandings of free expression of their opinions trying to fight the control of Christ men in a time that Tory party was Enklikanian more than as it was loyalty one .
The current study aims to demonstrate the role of strategic renewal in enhancing organizational immunity through strategic renewal mechanisms represented by (Reanimating, Rejuvenation, Venturing, and restructuring). The main idea of this study relates to the extent to which organizations’ immunity is achieved through strategic Renewal mechanisms, by measuring these dimensions with Organizational immunity represented by organizational learning, organizational memory, and organizational DNA. The study population was the headquarters of the Iraqi Ministry of Education, and the sample included (330) individuals from the upper, middle, and lower leadership levels. Several statistical methods were used to deal with the results of the questionna
... Show MoreThe current research aims to find out the effect of strategic sensitivity in enhancing organizational immunity at the leadership levels in the Iraqi Ministry of Education, as the strategic sensitivity variable includes two dimensions (strategic foresight and strategic Insight), and the organizational immunity variable addresses three dimensions (organizational learning, organizational memory and organizational DNA). The main purpose of this research was related to the extent to which the Ministry’s immunity was achieved through the role played by strategic sensitivity. A sample of (349) individuals was selected . The questionnaire was relied upon to collect data, and the number of questionnaires suitable for analysis was (330). Re
... Show Moreأن كرة السلة بما تتضمنه من مهارات حركية متنوعة تتطلب من ممارسيها امتلاك عدد من القدرات الحركية الخاصة وبشكل خاص التوافق العضلي العصبي والرشاقة والقوة المميزة بالسرعة، فضلاعن قدرات الإدراك الحس- حركي (إدراك المكان وقوة دفع الكرة سواء بالطبطبة العالية أو الواطئة .... الخ ) لذا تكمن أهمية البحث في إيجاد الطرق والوسائل التي تطور قدرة الطالبة على إدراك قوة دفع الكرة والإحساس بها أثناء تعلم وتدريب الطبطبة بأنواعها ب
... Show More“Child of today is a man of the future" this slogan is one of the most popular logos of international organizations and institutions that dealing with human beings needs in general and children needs in particular, whether these needs are educational, health, social, or economic. Children require special care and extra legal protection, since the child-raising is not the Child’s own issue, but it's the issue of the society in which he/she would integrate.
As the education and language skillsacquisition primarily associated with hearing, because human being receives most of the skills and knowledge through the hearing; that imitate sounds and learn how to speak isacquired only by hearing, so therefore the hearing - impairedchi
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show More