Background: Sildenafil, a selective phosphodiesterase -5 (PDE-5) inhibitor increases cyclic guanosine monophosphate (cGMP) and amplifies many biological actions of nitric oxide (NO) which is an important mediator of gastric mucosal defense ; was evaluated in this study using different doses for its cytoprotective effect on gastric mucosal damage induced by indomethacin . We also evaluated the effect of this drug on NO production, Prostaglandin E2 (PGE2) synthesis, Myeloperoxidase (MPO) activity, and Interlukin-4 (IL-4) expression.
Methods: The study was performed between April and July 2008 in the Department of Pharmacology / College of Medicine /Baghdad University .It was conducted on 80 adult male albino rats, divided into 8 groups, the first served as a control received the vehicle, the second received indomethacin orally of 60mg/kg .The third and fourth groups were pretreated 30 minutes prior indomethacin with oral sildenafil 10 and 20mg/kg respectively. The other groups were pretreated 30 minutes prior to sildenafil (10and20mg/kg) with intraperitoneal NG-L-Arginine Methyl Ester (L-NAME) 20mg/kg with or without L-Arginine. The rats were then sacrificed after 4 hours and their stomachs were isolated and submitted to macroscopical assessment and for the measurement of the gastric PGE2, MPO, and IL-4.
Results: Sildenafil (10 and 20 mg/kg) pretreatment resulted in a significant (p<0.01) decrease in the gastric damage score. The MPO activity was significantly (p<0.01) decreased, while the level of IL-4 was significantly (p<0.01) increased. On the other hand PGE2 level was not changed. L-NAME given 30 min before 10 and 20 mg/kg sildenafil, significantly (p<0.01) abolished the protective effects of sildenafil and also reversed the effects of sildenafil on MPO activity and IL-4 levels. On the other hand addition of L-Arginine resulted in the restoration of the protective effects of sildenafil which was also reflected on the gastric damage score, MPO activity and IL-4 levels.
Conclusions: The results demonstrate that the injurious effect of indomethacin can be reduced or ameliorated by sildenafil pretreatment, and that the protective effect of sildenafil against
indomethacin was through an NO dependent pathway.
“Child of today is a man of the future" this slogan is one of the most popular logos of international organizations and institutions that dealing with human beings needs in general and children needs in particular, whether these needs are educational, health, social, or economic. Children require special care and extra legal protection, since the child-raising is not the Child’s own issue, but it's the issue of the society in which he/she would integrate.
As the education and language skillsacquisition primarily associated with hearing, because human being receives most of the skills and knowledge through the hearing; that imitate sounds and learn how to speak isacquired only by hearing, so therefore the hearing - impairedchi
... Show MoreThe ability of insurance companies to achieve goals depends on their ability to meet customers' requirements, and this requires them to identify target markets and respond to needs and wishes of the markets, the skill is to convince the company to operate what is in the interest of the customer if he is convinced the customer service provided to him, he would repeat to deal with, and where the cost of maintaining existing customers is less than the cost of attracting new customers, the insurance companies that is working hard to maintain their customers, the more customer satisfaction with the services provided has increased loyalty and weakened the ability of competitors lured.
&nbs
... Show MoreThis review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreThe present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy
... Show MoreThe need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to
... Show MoreIn this work, watershed transform method was implemented to detect and extract tumors and abnormalities in MRI brain skull stripped images. An adaptive technique has been proposed to improve the performance of this method.Watershed transform algorithm based on clustering techniques: K-Means and FCM were implemented to reduce the oversegmentation problem. The K-Means and FCM clustered images were utilized as input images to the watershed algorithm as well as of the original image. The relative surface area of the extracted tumor region was calculated for each application. The results showed that watershed trnsform algorithm succeedeed to detect and extract the brain tumor regions very well according to the consult of a specialist doctor a
... Show MoreIn any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte
... Show MoreThe massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by
... Show More