Infection with cryptosporidiosis endangers the lives of many people with immunodeficiency, especially HIV patients. Nitazoxanide is one of the main therapeutic drugs used to treat cryptosporidiosis. However, it is poorly soluble in water, which restricts its usefulness and efficacy in immunocompromised patients. Surfactants have an amphiphilic character which indicates their ability to improve the water solubility of the hydrophobic drugs. Our research concerns the synthesis of new cationic Gemini surfactants that have the ability to improve the solubility of the drug Nanazoxide. So, we synthesized cationic Gemini surfactants. N1,N1,N3,N3-tetramethyl-N1,N3-bis(2-octadecanamidoethyl)propane-1,3-diaminium bromide (CGSPS18) and 2,2‘-(ethane-1,2-diylbis(oxy))bis(N-(2-octadecanamidoethyl)-N,N-dimethyl-2-oxoethane-1-aminium) dichloride (CGSES18) and the detection of their chemical composition by spectroscopic methods, as well as studying the properties of their surfaces and their toxicity. Furthermore, the efficacy of nitazoxanide in infected mice was studied in conjunction with three different doses of surfactants. To assess the effect of nitazoxanide and surfactants, the infection was parasitologically counted before and after treatment, and the intestinal, liver, and lung tissues were also examined histopathologically. In this study, it was found that the combination of the drug nitazoxanide with surfactants, especially the compound (CGSPS18) at a concentration of 25% increased the efficacy and resulted in a percentage reduction of 90.8%. Histopathological examination revealed that the group treated with the drug nitazoxanide in combination with CGSPS18 showed the best results exhibiting an almost normal villous pattern. This study demonstrated an increase in the effectiveness of nitazoxanide when combined with surfactants, and this suggests a promising future for the use of surfactants as an adjunct to enhance the effectiveness of nitazoxanide for the treatment of cryptosporidiosis in immunocompromised patients, particularly HIV patients.
Dengke Naniura is a traditional food from Sumatera Utara, Indonesia, that is produced through fermenting process, and this food is believed to contain high probiotics. The objective of the current research is to determine the potential of LAB as a probiotic that has been obtained from Dengke Naniura. Dengke Naniura was traditionally prepared from Cyprinus carpio. Four LABs have been successfully isolated from Dengke Naniura, such as D7DA3, D7B3, D7DBF and D7DN3. Those four LAB isolates were identified as Lactobacillus sp. This result has been confirmed by the non-spore forming bacterium, non-motile, and Gram-positive. Also, it has been supported by biochemical test, for the example Voges Proskauer, catalase test, Methyl
... Show MoreThe issue of peaceful coexistence between societies is the topic of the hour, as it is one of the important issues in this era, especially in days when conflicts and conflicts abound, and even wars in the name of religion, gender, race, language, and the like. The world, so that single-mindedness and adherence to one opinion and intolerance to it became the method of dialogue in our world today, as writing in the field of peaceful coexistence, peace-building, tolerance, pluralism, and acceptance of the other is one of the new fields of knowledge in Iraq in general and in Nineveh Governorate in particular, as peaceful coexistence is one of the basic needs And necessary for the presence of individuals in societies, and it requires the achi
... Show MoreThe present study aimed to asspssment the nutrition a program to sample of student from internal departments of Baghdad University (AL-Jadiriya Complex) and the University of AL-MustanSiriya four grades and aged (19-24) year study included 150 male and female students by (75) male and (75) of female register height, weight nd body mass index were study habits and food pattern of the same sample (150) and by aspecial form and take the personal information interviews and record information on food intake during 24 hour .noted adifference practie in the weights and longths of male and female (sample).
BMI rates were within the normal weight as the value of BMI for males aged (19- 21)and (22-24) and (22.21) and (23,37),respectively and th
The research aims to show the role or extent of the impact of financing in its various forms on the municipal performance before and after the financial deficit through relying on the analytical research methodology of the research community represented by the Directorate General of Municipalities and the Directorate of Maysan municipalities as a sample of research (13) municipal institutions for a period of (8) years, Considering the completion of the final accounts of these years, which provides the necessary data for the study, in addition to the variation in the quality and amounts of grants allocated to municipal institutions during these years, which gives a clearer and more comprehensive picture of the reality of allocatio
... Show MoreArabic language , like any other living languages grow and evolve ; social phenomenon
it is subject to the law of life ; therefore resemble organism also touted as the most eloquent
language and the ability to meet the needs of people in every time and place.
The contemplation of the verses of the Koran reveals a lot of means of expression
leading to the grammatical meaning of the social.
I have tried in this research that investigated the social meanings through the phenomena
of deletion and delivery delays and capture semantic landing through the meanings that lead
to psychological persuasion to comply with the orders after the rights of the divine in which
social directives.
It remains the greatest mystery o
Abstract
Theoretical and experimental methodologies were assessed to test curved beam made of layered composite material. The maximum stress and maximum deflection were computed for each layer and the effect of radius of curvature and curve shape on them. Because of the increase of the use of composite materials in aircraft structures and the renewed interest in these types of problems, the presented theoretical assessment was made using three different approaches: curved beam theory and an approximate 2D strength of material equations and finite element method (FEM) analysis by ANSYS 14.5 program for twelve cases of multi-layered cylindrical shell panel differs in fibe
... Show MoreAbstract
Objective(s): To evaluate the level of Psychological Empowerment among Nurses as perceived by their Point of View, and identify the differences in nurses' Psychological Empowerment with regard to age, gender, graduation level, and years of work employment.
Methodology: A descriptive analytic design was conducted on nurses in Psycho-social health Units in Primary Health Care Centers in Kirkuk Governorate, to achieve the objectives of the study. A convenient (non-probability) sample of 84 nurses was selected. The data collected through self-report method for the period from 25th August to 10th October 2022. The questionnaire was adopted
... Show MoreThis study was carried out to investigate the preparation of thermosetting polymeric blend consisting of three adhesive types, namely: epoxy, polyvinyl formal (PVF) and unsaturated polyester. Both of epoxy and PVF were used as a matrix-binder at fixed weight. Whilst unsaturated polyester was used at different weights and added to the matrix so as to produce prepared epoxy-PVF-unsaturated polyester blend. Several experiments were performed at different operating conditions, mixing speed and time at room temperature to identify the most favorable operating conditions. The optimum mixing speed and mixing time for the prepared blend were 500rpm and 5 minutes respectively.
Solid wastes-synthetic sack fib
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More