Oxidative stress is oxidative damage caused by free radicals and reactive oxygen species (ROS). These ROS can cause oxidative damage to cellular components, including membrane lipids, receptors, enzymes, proteins, and nucleic acids. It would eventually lead to cell apoptosis and the appearance of certain pathological conditions. This work investigates the antioxidant potentials of chamomile extract in vitro by evaluating the extract activity to scavenge 2,2-Diphenyl-1-picrylhydrazyl (DPPH), also in vivo by investigating its effects on oxidative stress-induced rats by assessing the total oxidant status (TOS) and total antioxidant capacity in the radiation exposed rats with and without the treatment with chamomile extract. The results have shown that chamomile extract contains materials with antioxidant properties. The in vitro analyses have indicated activity to detoxify the DPPH radicals almost as powerful as pure ascorbic acid. Furthermore, rats exposed to electromagnetic radiation have shown a disturbance in the balance of oxidants and antioxidants, in which the levels of TOS were elevated while the levels of TAC were reduced. Chamomile extract has been shown to exhibit a powerful function as an antioxidant in vivo. It has enhanced the antioxidant capacity of rats, reduced their total oxidant status, and protected exposure to radiation.
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreIn spite of the foundation of Iraqi state in 1921 and the formation of the new features of
the modern state, however, the inherited costumes and traditions sustained in the conservative
society. But due to the development that inflicted to the Iraqi society and the development of
the staff in all fields and requirement conducting to female learning. After WW II and the
1950s, women get out of their houses to seek learning by approaching the doors.
What is positive about that phase was the formation of the College of Queen A'liya
which is regarded as a positive indicator. In any case the Iraqi family encouraged women to
be indulged in higher education. Calling the college Queen A'liya
500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met
... Show MoreThe study aims to identify the neurological perfectionism of talented girls with disabilities and do a case study for one of these girls. The sample of the study consisted of (11) female students at the university level, 5 females with disability and (6) normal female-students. The sample also included (19) secondary school female students in Tabuk region, including 10 students with visual disability and (9) normal students. The case study was limited to one case of mentally superior girls (talented) with kinetic disability. The researcher adopted the descriptive methodology (case study), he used neurological perfectionism scale, Salah Mekhemar interview, Stanford interfacial intelligence scale fifth picture, case study form. The re
... Show MoreThe current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreIn this work the parameters of plasma (electron temperature Te,
electron density ne, electron velocity and ion velocity) have been
studied by using the spectrometer that collect the spectrum of
plasma. Two cathodes were used (Si:Si) P-type and deposited on
glass. In this research argon gas has been used at various values of
pressures (0.5, 0.4, 0.3, and 0.2 torr) with constant deposition time
4 hrs. The results of electron temperature were (31596.19, 31099.77,
26020.14 and 25372.64) kelvin, and electron density (7.60*1016,
8.16*1016, 6.82*1016 and 7.11*1016) m-3. Optical properties of Si
were determined through the optical transmission method using
ultraviolet visible spectrophotometer with in the range
(
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreThis research discusses the verbal follow phenomenon in Al-Amali Abi Al-Qali’s book (seq.356 Hijri). It aims to limit the examples of this phenomenon in the book, and examine it phonologically. Accordingly, the researcher adopted the analaytical descriptive approach, taking into account Al-Rawi’s letter when ordering the verbal follow-based examples, and the order they took in the book in question. The purposes behind this phonological study of verbal follow in Al-Amali’s book are to: reach the sounds which Arabs prefer in the process of following, confirm different beautiful and desirable senses, have easy and speedy pronunciation, maintain harmony between adjacent sounds, count the sounds that occur at the beginning of the
... Show MoreKE Sharquie, AA Noaimi, BAM Saleh, 2015
This paper is submitted as anew approach to simulate manufacturing control & planning system to define the problem of designing control system on the needs for materials.
Production planning & control is a total and complex operation, resides in the essence of manufacturing companies operations. The successful process of production planning and control systems is critical for the staying of manufacturing organizations in markets leading to the increasing consumer competition and which dominate most of manufacturing sectors because of the market oriented economy , thus , what has happened previously , that the companies possessed a great inventory of crude material, components, and groupings and they use in flexible techni
... Show More