Preferred Language
Articles
/
iqjmc-950
The cytoprotective effect of different doses of Sildenafil on indomethacin-induced gastric mucosal damage in rats:
...Show More Authors

Background: Sildenafil, a selective phosphodiesterase -5 (PDE-5) inhibitor increases cyclic guanosine monophosphate (cGMP) and amplifies many biological actions of nitric oxide (NO) which is an important mediator of gastric mucosal defense ; was evaluated in this study using different doses for its cytoprotective effect on gastric mucosal damage induced by indomethacin . We also evaluated the effect of this drug on NO production, Prostaglandin E2 (PGE2) synthesis, Myeloperoxidase (MPO) activity, and Interlukin-4 (IL-4) expression.
Methods: The study was performed between April and July 2008 in the Department of Pharmacology / College of Medicine /Baghdad University .It was conducted on 80 adult male albino rats, divided into 8 groups, the first served as a control received the vehicle, the second received indomethacin orally of 60mg/kg .The third and fourth groups were pretreated 30 minutes prior indomethacin with oral sildenafil 10 and 20mg/kg respectively. The other groups were pretreated 30 minutes prior to sildenafil (10and20mg/kg) with intraperitoneal NG-L-Arginine Methyl Ester (L-NAME) 20mg/kg with or without L-Arginine. The rats were then sacrificed after 4 hours and their stomachs were isolated and submitted to macroscopical assessment and for the measurement of the gastric PGE2, MPO, and IL-4.
Results: Sildenafil (10 and 20 mg/kg) pretreatment resulted in a significant (p<0.01) decrease in the gastric damage score. The MPO activity was significantly (p<0.01) decreased, while the level of IL-4 was significantly (p<0.01) increased. On the other hand PGE2 level was not changed. L-NAME given 30 min before 10 and 20 mg/kg sildenafil, significantly (p<0.01) abolished the protective effects of sildenafil and also reversed the effects of sildenafil on MPO activity and IL-4 levels. On the other hand addition of L-Arginine resulted in the restoration of the protective effects of sildenafil which was also reflected on the gastric damage score, MPO activity and IL-4 levels.
Conclusions: The results demonstrate that the injurious effect of indomethacin can be reduced or ameliorated by sildenafil pretreatment, and that the protective effect of sildenafil against
indomethacin was through an NO dependent pathway.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 28 2019
Journal Name
Journal Of The College Of Education For Women
The Effectiveness of an Educational Program For Early Intervention depending on Illustrative Pictures to Acquire some concepts For Children with Hearing impairment
...Show More Authors

“Child of today is a man of the future" this slogan is one of the most popular logos of international organizations and institutions that dealing with human beings needs in general and children needs in particular, whether these needs are educational, health, social, or economic. Children require special care and extra legal protection, since the child-raising is not the Child’s own issue, but it's the issue of the society in which he/she would integrate.

As the education and language skillsacquisition primarily associated with hearing, because human being receives most of the skills and knowledge through the hearing; that imitate sounds and learn how to speak isacquired only by hearing, so therefore the hearing - impairedchi

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Marketing mix and its role in promoting the status of insurance companies in the customers mind: Exploratory comparative research between the Iraq public insurance company and the private insurance company
...Show More Authors

The ability of insurance companies to achieve goals depends on their ability to meet customers' requirements, and this requires them to identify target markets and respond to needs and wishes of the markets, the skill is to convince the company to operate what is in the interest of the customer if he is convinced the customer service provided to him, he would repeat to deal with, and where the cost of maintaining existing customers is less than the cost of attracting new customers, the insurance companies that is working hard to maintain their customers, the more customer satisfaction with the services provided has increased loyalty and weakened the ability of competitors lured.

       &nbs

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 25 2023
Journal Name
Urban Planning And Construction
A Review on Urban Planning and Its Role in Managing Flood Risks
...Show More Authors

This review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil

... Show More
View Publication
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Aci Structural Journal
Stress at Ultimate in Internally Unbonded Steel Based on Genetic Expression Programming
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Energy and Exergy Analysis on Modified Closed Wet Cooling Tower in Iraq
...Show More Authors

The present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Watershed Transform Based on Clustering Techniques to Extract Brain Tumors in MRI
...Show More Authors

In this work, watershed transform method was implemented to detect and extract tumors and abnormalities in MRI brain skull stripped images. An adaptive technique has been proposed to improve the performance of this method.Watershed transform algorithm based on clustering techniques: K-Means and FCM were implemented to reduce the oversegmentation problem. The K-Means and FCM clustered images were utilized as input images to the watershed algorithm as well as of the original image. The relative surface area of the extracted tumor region was calculated for each application. The results showed that watershed trnsform algorithm succeedeed to detect and extract the brain tumor regions very well according to the consult of a specialist doctor a

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Proposed Hiding Text in Text Based On RNA for Encoding Secret Information
...Show More Authors

In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Digital Watermarking in Color Image Based On Joint Between DCT and DWT
...Show More Authors

The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by

... Show More
View Publication Preview PDF
Crossref