Quercetin, one of the flavonoids family member, can be found in many vegetables, fruits, and beverages with a noticeable nutritional pharmacological properties. This study was aimed to evaluate the ability of quercetin to inhibit lipopolysaccharide (LPS) that induced lethal toxicity in vivo, and to elucidate the importance of the quercetin as an antitumor agent in breast cancer cell line MCF-7.In vivo experiments included the effect of hesperidin and LPS on the liver and spleen of male mice. In the liver, the antioxidant activity was measured by estimating the concentration of glutathione (GSH), and catalase (CAT), while in the spleen, the concentration of cytokines was measured including IL-33 and TNF-α. In vitro experiments included MTT assay, colonogenicity test and Sulforhadamine 101 to assess breast cancer cells morphological apoptosis. The studies revealed the following results: highly significant increase in IL-33 and TNF-αcytokine levels in LPS challenge mice along with significant glutathione (GSH), and catalase (CAT) level increased compared to control group. The cytotoxicity on MCF-7 cell line showed significant differences between groups treated with different concentrations in comparison with control groups in a concentration-dependent manner. The colony measurement test showed that quercetin significantly inhibited colony formation of MCF7 cells compared to control. Apoptotic morphological results showed clear changes in the shape associated with a later stage of apoptosis, including cell shrinking and chromatin condensation. The obtained results indicate that hesperidin might be a potential beneficial compound as a preventive agent
The aim of the research is to investigate potential effects of the finance industry and block-chain to general business of financing in particular, as well as its shortcomings and difficulties. To answer the research questions, the researcher used the objective narrative-analytical descriptive approach and included a qualitative analysis of Blockchain technology. The process of Blockchain technology based on their industries, the authors were selected based on their reputation in the Blockchain field. The research found that Blockchain can improve the efficiency of the banking industry's various sections. It has the ability to upgrade and transfer wages across borders, financial reporting and compliance, as well as trade finance
... Show MoreThe summary of this study is to identify the relation ship between exposuing of the
public to foreign satellites and the degree of cultural of Iraqi public . the danger Iraqi public
exposure to foreign satellite specially some groups of the public are still own limited culture
and ideology without enough conscious to attitude of society . such people cun easily be
controlled by satellites , because these satellites may be the only cultural source for them
which may badly affect their behaviour . This study also aims to identify the level of Iraqi
people exposure to foreign satellites and the types and motivations of that exposure , then to
realize the relationship between exposing to foreign satellites and the cultur
Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn The Name of Allah Most Gracious Most Merciful
The reason for choosing this topic was:
First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.
Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).
Third: The study of the jurisprudence of the companions
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreObjective(s): The study aims at evaluating pregnancy-related health behaviors for pregnant women, and to identify the association between pregnancy-related health behaviors and their demographic characteristics of pregnant woman’s age, education, employment, residential area and monthly income.
Methodology: A descriptive study is carried out for the period from December 14th, 2020 to June 20th, 2021. This study was conducted through a non-probability (convenience) sample of 150 pregnant women attending, Abo Ghareeb primary health care sector in Abo Ghareeb spend. The sample has been collected by using the instrument to gather data and accomplish the study's objectives. A questionnaire is composed of (29) items and it is divided into
A Stereomicroscopic Evaluation of Four Endodontic Sealers Penetration into Artificial Lateral Canals Using Gutta-Percha Single Cone Obturation Technique, Omar Jihad Banawi*, Raghad