Background: Levetiracetam is a member of the new antiepileptic drugs and has a broad spectrum effect, used as an adjunctive therapy in addition to monotherapy in the treatment of partial onset-seizures. The effect of levetiracetam on the development of embryo nervous system after maternal exposure during pregnancy has not been identified. Objective: to evaluate the effect of antiepileptic drug, levetiracetam (LEV) within its therapeutic dose 350mg/Kg body weight on albino female rat to clarify its effect on the developing cerebral cortex histologically. Material And Methods: Ten pregnant female rats were separated into two groups, control group and experimental group. They were obtained from the animal house of the high institute of infertility diagnosis and assisted reproductive technologies/Al-Nahrain university. They were maintained in environmentally controlled room at a temperature of 21–28±4Cº, 40–60% humidity, 12 hours light-dark cycle, in a noise free environment. Oral administration of 350mg/Kg of LEV to the experiment group while physiologic saline was given to control group. Results: microscopic assessment of the cerebral cortex defects in the cerebrum of the treated group when compared with the control group. There was disorganization of the cortical layers where boundaries were dimmed, the depth of the six layers were overlapping, decreased proportion of the stellate cells in the external granular layer therefore, reducing layer outline, vascular congestion and hemorrhage. Furthermore, observation shows cellular degeneration, necrosis, and nucleus karyorrhexis. Conclusion: this study demonstrate that they must take care from giving Levetiracetam to pregnant female because it induces histological changes in the brain of the newborn rat.
Achieve breastfeeding book and theft book
To the end of the door cut the way of the manuscript
Sailing Forum for Sheikh Ibrahim bin Mohammed Halabi
(T: 659 H)
The study aimed to estimate the content of lead and determine the quality of the internal coating of metal cans through electrical conductivity as well as to determine the accuracy of the information card for some types of canned food that available in local markets. The information card test showed that all of these samples contained the name of the food, trade mark, country origin, weight, and components, as was indicated by the company producing in all of them except for the C12 sample which was otherwise, and the batch number was mentioned in all samples except for the C3 and C17 which was not clear and not mentioned in the C21, and the validity period was observed (produce and fini
... Show MoreThe worsening of environmental problems has led to them being addressed by many entities, the most important of which are the top regulators. Federal Board of supreme audit Office is one of the most important regulators in Iraq. The problem of the research was the fundamental question of the extent to which the Federal Financial Supervisory Office was committed to implementing and exercising environmental control over the audited ones. The refore, the research was based on the main objective of questioning the role of the Federal Financial Supervisory Office in the exercise of environmental control and the compliance of those under its control, by identifying the antosai standards for environmental control, particularly the stand
... Show More Thsst researcher problem of delays faced by researchers are all waiting to evaluate their standards by the experts who must take their views to extract the truth Virtual important step first step in building standards whatsoever, then the difference of opinion among experts about the paragraphs Whatever the scope of their functions, leading to confusion in maintaining these paragraphs or delete? Or ignore the views and opinion of the researcher to maintain the same? Or as agreed upon with the supervisor if he was a student? Especially if the concepts of a modern new building.
Therefore, the researcher sought to try to find a solution to her problem to conduct an experiment to test building steps
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreIn this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreLet M is a Г-ring. In this paper the concept of orthogonal symmetric higher bi-derivations on semiprime Г-ring is presented and studied and the relations of two symmetric higher bi-derivations on Г-ring are introduced.