The present study aimed to investigate the toxic and mutagenic and anti – mutagenic effects of the aqueous extract (5, 10 and 15 mg/kg) of green tea (Camellia sinensis) in modulating the genotoxic effects of mitomycin C (MMC). Albino male mice (Mus musculs) were employed as a biological system and four parameters were performed in vivo; total leucocyte count, mitotic index, chromosomal aberrations and micronucleus formation. The plant extract was evaluated through three types of treatments. In the first, the extract was given alone orally. While the second and third treatment included two types of interactions with MMC; pre – and post – MMC treatments. All treatments were paralleled by negative and positive controls. In the first treatment, the dose 15 mg/kg of green tea extract enhanced the parameters investigated and a significant increase was observed in total count of leucocyte (8070 cells/cu. mm. blood) as compared to either negative (6900 cells/cu. mm. blood) or positive (5060 cells/cu. mm. blood) controls, Such observation was positively correlated with the mitotic index. In contrast, the spontaneous formation of micronuceli and chromosomal aberrations were decreased in the three investigated doses of the extract. The results showed that the plant extract had no genotoxic or mutgenic effects. In the second and third treatments, green tea extract showed a good performance in protecting the bone marrow cells in mice against genotoxic MMC effect by increasing the total leucocyte count and mitotic index and decreasing the chromosomal aberration and mironuclei when the treatment were before or after the MMC.
Abstract: The international community now places significant emphasis on achieving zero carbon emissions, requiring both new researchers and experienced policymakers to prioritise this goal. This article examines the effects of carbon taxes, carbon cap and trade, renewable energy (RE) production and consumption, and economic growth (EG) on carbon emission reduction in the United States, Japan, Canada, and Australia. The study collected secondary data from the World Development Indicators (WDI) secondary source spanning the years 1991 to 2022. The study examines the relationship between variables using the cross-sectionally augmented autoregressive distributed lag (CS-ARDL) approach. The findings indicate that carbon taxes, carbon cap and tr
... Show MoreAbstract
This research aims to identify the challenges faced by families of children with intellectual disabilities and to identify the impact of the challenges facing them on the mental health of their children with intellectual disabilities. Based on the following questions: What is the nature of the challenges faced by families of children with disabilities and how do these challenges affect the mental health of their children with intellectual disabilities? The study was conducted on a sample of four families of six children with intellectual disabilities, depending on the degree and type of disability. To achieve the study's objectives, the qualitative approach was used, Because of the importance of accessin
... Show MoreIn recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS. This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP
... Show MoreThe objective of the study is to study how to employ performance evaluation in achieving organizational integrity and the impact of performance evaluation on achieving organizational integrity. In light of this, the following questions were raised:
Are the dimensions of organizational integrity available in the field in question?
In order to answer the research questions, a questionnaire questionnaire was distributed to the sample of 30 members of the teaching staff at the Technical Institute in Mosul. The three-dimensional Lycert scale was used. The statistical methods were used, ie, the frequency distribution, the computational circles, the standard deviations, Pearson), simple
... Show MoreAbstract:
The aim of the research is to verify the role of organizational trust as an “administrative” dimension of objective importance in the relationships adopted by the Iraqi General Insurance Company with customers, as it is one of the basic pillars in building and succeeding companies, which allows the provision of services with high confidence through the customer relationship management system in order to achieve The company's goal is to gain new customers, retain current customers, increase work in insurance companies, and develop the national economy by increasing the company's sales and profitability. The research
... Show Morethe researchers Sought to determine the impact of the customer contact (Within a client contact there are two times, first is the total time required to create a service and within it there is contact time while the second time is the time of client contact ؛ where means a time that records the physical presence of the customer during the process of service) on operations performance by concentrate attention on the cost (labor productivity) and quality (patient ratio to the doctor) and speed (cycle time) and flexibility (the flexibility range) , as well as ruling out variable of innovation because of impossibility to measure this variable in the Specialty Center for Dental in al-alwia due to the center is lacking of mechanisms t
... Show MoreThis article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t
... Show More