Rifampicin (RF) considered a hepatotoxic drug. Is one of the first line successful drugs of management of tuberculosis. To reduce injury and protect liver from adverse effect of Rifampicin, this study was designed to investigate the activity of Nigella Sativa (NS) seeds powder aqueous suspension to hepato protection against Rifampicin.
For conducting this study,24 male albino rats were divided into four groups and all treated orally as follow; group І (control), received normal saline alone; group II, received RF (50mg/kg body weight/day); group III received NS it's called normal dose, (2g/kg body weight day); group IV RF (50mg/kg body weight) + NS (2g/kg body weight).Respectively for 28 days. Blood samples obtained for estimation of liver foundation parameters and enzymes such as serum alkaline phosphate (ALP), serum glutamic pyruvic transaminase (SGPT), serum glutamic Oxaloacetic transaminase (SGOT) and serum bilirubin. After rats were scarified, liver tissue sections were prepared for histopathological examination. The results parameters in treated rats in group II showed a significant (P<0.05) increase, while group IV showed a significant (P<0.05) decrease in biochemical parameters of liver. Liver histopathological examination of animal group treated with RF showed focal necrotic area in the hepatocyte and neutrophils and mononuclear cells aggregation in thickening wall of congested blood vessels with large granulomatous lesion in liver Parenchyma.
The Histological examination of pre-treatment animal group of NS (2g/kg body weight) showed near normal liver architecture with moderate aggregation of mononuclear cell around blood vessels and moderate proliferation of kupffer cells.
Pre-treatment of NS produced significant hepatoprotection by decreasing the levels of ALP, SGOT, SGPT and bilirubin. The result indicates clearly that NS possesses hepatoprotective and activity against RF induced hepato toxicity.
In this paper, the concept of soft closed groups is presented using the soft ideal pre-generalized open and soft pre-open, which are -ᶅ- - -closed sets " -closed", Which illustrating several characteristics of these groups. We also use some games and - Separation Axiom, such as (Ʈ0, Ӽ, ᶅ) that use many tables and charts to illustrate this. Also, we put some proposals to study the relationship between these games and give some examples.
Background: The estimation of ferritin and related variables by complete serum iron profile, for Iraqi hashimoto’s patients to see the effect of thyroid hormone insufficiency, which may lead to deficiency of ferritin iron stores, this may be quite useful during the diagnosis and treatment of hashimoto’s patients. Patients and Method: The study was performed at National Center of Teaching laboratories of Medical city institute in Baghdad. Fifty newly diagnosed patients with hashimoto’s and forty apparently healthy controls. Diagnosis based on thyroid profile analysis including:Thyroid Stimulating Hormone (TSH), Thyroxine (totalT4) and Triiodothyronine (total T3), estimation of antibodies against thyroperoxidase, iron profile including:
... Show MoreIn this research, has been to building a multi objective Stochastic Aggregate Production Planning model for General al Mansour company Data with Stochastic demand under changing of market and uncertainty environment in aim to draw strong production plans. The analysis to derive insights on management issues regular and extra labour costs and the costs of maintaining inventories and good policy choice under the influence medium and optimistic adoption of the model of random has adoption form and had adopted two objective functions total cost function (the core) and income and function for a random template priority compared with fixed forms with objective function and the results showed that the model of two phases wit
... Show MoreIn this work we reported the synchronization delay in
semiconductor laser (SL) networks. The unidirectional
configurations between successive oscillators and the correlation
between them are achieved. The coupling strength is a control
parameter so when we increase coupling strength the dynamic of the
system has been change. In addition the time required to synchronize
network components (delay of synchronization) has been studied as
well. The synchronization delay has been increased by mean of
increasing the number of oscillators. Finally, explanation of the time
required to synchronize oscillators in the network at different
coupling strengths.
Background: Pneumonia is the common lower respiratory tract infection among pediatrics, especially under five; it is a common cause of under-five children morbidity and mortality. Objectives of study: To identify nurses' perceptions toward therapeutic strategies for children with pneumonia and to find the association between their perceptions and their demographic variables. Methods: A Convenient sample of 46 nurses in Baghdad city from three hospitals) Kadhimiya Hospital for Children, Central Teaching Hospital of Pediatrics, and Child Welfare Teaching Hospital) included in the study to identify their perceptions regarding pneumonia in children. Results: The results of the study present that most of the nurses' participants in the a
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show More