This study was aimed to investigate the effects of Cuminum cyminum seed aqueous extract on the function and histological structure of rat kidney treated with dibutyl phthalate (DBP). Eighteen albino rats weighing 190-240g and aged 10-12 weeks were used for this study which went on for 28 days. The rats were divided into three groups (each with six animals): 1st group: control rats were given food and tap water, 2nd group was given DBP (420mg/Kg. B.W.) with tap water and diet, 3rd group were fed cumin plant orally at a daily dose of (200 mg/kg B.W.) and DBP (420mg/kg. B.W.) was given with drinking water and fed with diet daily. Kidney and liver function parameters were measured and histological structure of kidney was examined. Results showed that DBP significantly increased creatinine, urea as well as liver parameters AST and ALT, while decreased ALP level, destruction, hemorrhage and inflammation in kidney. Cumin decreased AST and ALT level but increased ALP level and elevated kidney hemorrhage which concluded that DBP may cause oxidative stress for rat liver and kidney. Despite hepatoprotective role of cumin, it interacts with DPB and increases bleeding in kidney.
ABSTRACTBackground: In Iraq smoking is a common habit in both the urban and rural areas. There are many respiratory diseases like chronic bronchitis, bronchial carcinoma and emphysema which are related to chronic tobacco smoking.Objectives: To study the effect of tobacco smoking on the respiratory system, to establish a correlation between chronic tobacco smoking and its effects on the parameters which were studied and to create awareness in tobacco smokers about the effects of tobacco on their healthMethod: In this study 100 male subjects, 50 chronic smokers and 50 non- smokers were assessed for their pulmonary function tests by using a computerized spirometer.Results: Almost all their respiratory parameters were significantly reduced.
... Show MoreIn this paper, a Monte Carlo Simulation technique is used to compare the performance of MLE and the standard Bayes estimators of the reliability function of the one parameter exponential distribution.Two types of loss functions are adopted, namely, squared error loss function (SELF) and modified square error loss function (MSELF) with informative and non- informative prior. The criterion integrated mean square error (IMSE) is employed to assess the performance of such estimators .
Viscosities (η) and densities (ρ) of atenolol and propranolol hydrochloride in water and in concentrations (0.05 M) and (0.1 M) aqueous solution of threonine have been used to reform different important thermodynamic parameters like apparent molal volumes fv partial molal volumes at infinite dilution fvo , transfer volume fvo (tr), the slop Sv , Gibbs free energy of activation for viscous flow of solution ΔG*1,2 and the B-coefficient have been calculated using Jones-Dole equation. These thermodynamic parameters have been predicted in terms of solute-solute and solute-solvent interaction.
Background: Bisphosphonates are potent inhibitors of osteoclastic bone resorption and widely used for the treatment of osteoporosis, and osteogenesis imperfecta in children. Clinical and experimental studies have demonstrated that Bisphosphonates delay or inhibit tooth eruption. This study tries to focus on the effect of bisphosphonate on teeth development and jaw bones growth. Materials and methods: The present study includes 65 neonatal rats during lactation period from 15 Albino Wister rats mother. Alendronate (one type of Bisphosphonates) was administrated orally (15 mg/kg) into 10 pregnant rats two times a week, while other 5 rats regard as control. Then the neonatal rats sacrificed in I, 6, 11, 16 and 21 days. The lower first molar we
... Show MoreIn this study we examine variations in the structure of perovskite compounds of LaBa2Cu2O9, LaBa2CaCu3O12 and LaBa2Ca2Cu5O15 synthesized using the solid state reaction method. The samples’ compositions were assessed using X-ray fluorescence (XRF) analysis. The La: Ba: Ca: Cu ratios for samples LaBa2Cu2O9, LaBa2CaCu3O12 and LaBa2Ca2Cu5O15 were found by XRF analysis to be around 1:2:0:2, 1:2:1:3, and 1:2:2:5, respectively. The samples’ well-known structures were then analyzed using X-ray diffraction. The three samples largely consist of phases 1202, 1213, and 1225, with a trace quantity of an unknown secondary phase, based on the intensities and locations of the diffraction peaks. According to the measured parameters a, b, and c, every sa
... Show MoreIn this article, we developed a new loss function, as the simplification of linear exponential loss function (LINEX) by weighting LINEX function. We derive a scale parameter, reliability and the hazard functions in accordance with upper record values of the Lomax distribution (LD). To study a small sample behavior performance of the proposed loss function using a Monte Carlo simulation, we make a comparison among maximum likelihood estimator, Bayesian estimator by means of LINEX loss function and Bayesian estimator using square error loss (SE) function. The consequences have shown that a modified method is the finest for valuing a scale parameter, reliability and hazard functions.
The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos