Rifampicin (RF) considered a hepatotoxic drug. Is one of the first line successful drugs of management of tuberculosis. To reduce injury and protect liver from adverse effect of Rifampicin, this study was designed to investigate the activity of Nigella Sativa (NS) seeds powder aqueous suspension to hepato protection against Rifampicin.
For conducting this study,24 male albino rats were divided into four groups and all treated orally as follow; group І (control), received normal saline alone; group II, received RF (50mg/kg body weight/day); group III received NS it's called normal dose, (2g/kg body weight day); group IV RF (50mg/kg body weight) + NS (2g/kg body weight).Respectively for 28 days. Blood samples obtained for estimation of liver foundation parameters and enzymes such as serum alkaline phosphate (ALP), serum glutamic pyruvic transaminase (SGPT), serum glutamic Oxaloacetic transaminase (SGOT) and serum bilirubin. After rats were scarified, liver tissue sections were prepared for histopathological examination. The results parameters in treated rats in group II showed a significant (P<0.05) increase, while group IV showed a significant (P<0.05) decrease in biochemical parameters of liver. Liver histopathological examination of animal group treated with RF showed focal necrotic area in the hepatocyte and neutrophils and mononuclear cells aggregation in thickening wall of congested blood vessels with large granulomatous lesion in liver Parenchyma.
The Histological examination of pre-treatment animal group of NS (2g/kg body weight) showed near normal liver architecture with moderate aggregation of mononuclear cell around blood vessels and moderate proliferation of kupffer cells.
Pre-treatment of NS produced significant hepatoprotection by decreasing the levels of ALP, SGOT, SGPT and bilirubin. The result indicates clearly that NS possesses hepatoprotective and activity against RF induced hepato toxicity.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreIn The Name of Allah Most Gracious Most Merciful
The reason for choosing this topic was:
First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.
Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).
Third: The study of the jurisprudence of the companions
The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe research aims to determine the effectiveness of auditing in light of the relationship between the governance of investment policy and the cost of debt in companies listed on the Iraqi Stock Exchange. The problem of the research is to raise the question about the effect of the governance of investment policy and the cost of debt on the effectiveness of auditing and auditors. During the research, the most important of them were: the existence of an impact relationship on the effectiveness of auditing through the relationship between the governance of investment policy and the cost of debt. The companies listed in the Iraqi Stock Exchange lack an effective proposed guide or framework dealing with the governance of investment policy desp
... Show MoreThe sports field is one of the fields that are concerned with the various methods and methods because of their positive impact on the development of actual training, the investment of the exerted effort in time, and through the follow-up of the researcher in the field and academic field, I noticed that there is a weakness in explosive ability, which affects performance and skill level during training and competition Therefore, the researcher decided to prepare maximum physical exertion exercises according to the anaerobic threshold as a principle of development in many physical and skill variables because good physical performance leads to reaching the best achievements and since the skill of shooting by jumping high - either constitutes a
... Show MoreThis research aims to examine the effectiveness of a teaching strategy based on the cognitive model of Daniel in the development of achievement and the motivation of learning the school mathematics among the third intermediate grade students in the light of their study of "Systems of Linear Equations”. The research was conducted in the first semester (1439/1440AH), at Saeed Ibn Almosaieb Intermediate School, in Arar, Saudi Arabia. A quasi-experimental design has been used. In addition, a (pre & post) achievement test (20 Questions) and a (pre & post) scale of learning motivation to the school mathematics (25 Items) have been applied on two groups: a control group (31Students), and an experimental group (29 Students). The resear
... Show More