Preferred Language
Articles
/
bsj-7594
Lead acetate deteriorates the improvement effect of L-arginine and tetrahydrobiopterin on endothelin-1 receptors activity in rat aorta
...Show More Authors

Endothelin-1 (ET-1) is a potent vasoconstrictor hormone that has been identified as an important factor
responsible for the development of cardiovascular dysfunctions. ET-1 exerts its vasoconstrictor activity
through two pharmacologically distinct receptors, ETA and ETB that are found in vascular smooth muscle
cells (VSMCs) and the vasodilator activity through an ETB receptor located on endothelial cells. This study
aimed to show the impact of 1µM L-arginine (LA), 100µM tetrahydrobiopterin (BH4), and their combined
effect on ET-1 activity in both lead-treated and lead-untreated rat aortic rings. This means, investigating how
endothelial dysfunction reverses the role of nitric oxide precursor and cofactor. In this study, Rat aortic rings
have been pre-incubated with BH4, LA and their combination. Subsequently, the aortic rings were preincubated with 200µM N-Nitro-L-arginine methyl ester (L-NAME) and 0.5µM BQ-123. Then, the vascular
response to cumulative doses of rat ET-1 was analyzed in each of the above-mentioned groups (LA, BH4, LA
& BH4, L-NAME, BQ-123), in the presence and absence of lead acetate 1µM Pb (C2H3O2)2. ET-1 efficacy and
potency were significantly decreased in the presence of LA, BH4, and LA and BH4 combination in the untreated
group, while it significantly increased in the presence of lead. In the second trial of experiments ET-1 efficacy
markedly decreased in BQ-123- incubated cells in both lead-treated and untreated aortic rings. In the presence
of lead, the efficacy of ET-1 was raised with the use of L-NAME. In conclusion, LA and BH4 can be considered
pharmacological agents to alter the potency of ET-1-induced vasoconstriction and concomitantly lower blood
pressure.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
On strongly E-convex sets and strongly E-convex cone sets
...Show More Authors

              -convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties.  Some examples to illustrate the aforementioned concepts and to cl

... Show More
View Publication
Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Fri Apr 30 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences (ihjpas)
Biochemical Study on Splenectomy and Non Splenectomy Iraqi Major Thalassemic Patients
...Show More Authors

Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
African Journal Of Hospitality, Tourism And Leisure
Social responsibility for tourism companies and its reflection on strategic reputation
...Show More Authors

Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Energy management and storage systems on electric vehicles: A comprehensive review
...Show More Authors

View Publication
Scopus (49)
Crossref (45)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Review on Heat Transfer Process Inside Open and Closed Porous Cavity
...Show More Authors

Many researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc

... Show More
View Publication Preview PDF
Crossref (1)
Crossref