Preferred Language
Articles
/
jRY7bIoBVTCNdQwCwp1k
Evaluation of in vivo and in vitro protective effects of quercetin on lipopolysaccharide-induced inflammation and cytotoxicology
...Show More Authors

Quercetin, one of the flavonoids family member, can be found in many vegetables, fruits, and beverages with a noticeable nutritional pharmacological properties. This study was aimed to evaluate the ability of quercetin to inhibit lipopolysaccharide (LPS) that induced lethal toxicity in vivo, and to elucidate the importance of the quercetin as an antitumor agent in breast cancer cell line MCF-7.In vivo experiments included the effect of hesperidin and LPS on the liver and spleen of male mice. In the liver, the antioxidant activity was measured by estimating the concentration of glutathione (GSH), and catalase (CAT), while in the spleen, the concentration of cytokines was measured including IL-33 and TNF-α. In vitro experiments included MTT assay, colonogenicity test and Sulforhadamine 101 to assess breast cancer cells morphological apoptosis. The studies revealed the following results: highly significant increase in IL-33 and TNF-αcytokine levels in LPS challenge mice along with significant glutathione (GSH), and catalase (CAT) level increased compared to control group. The cytotoxicity on MCF-7 cell line showed significant differences between groups treated with different concentrations in comparison with control groups in a concentration-dependent manner. The colony measurement test showed that quercetin significantly inhibited colony formation of MCF7 cells compared to control. Apoptotic morphological results showed clear changes in the shape associated with a later stage of apoptosis, including cell shrinking and chromatin condensation. The obtained results indicate that hesperidin might be a potential beneficial compound as a preventive agent

Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Blockchain Technology and its Potential Effect on the Banking Industry (China Case Study)
...Show More Authors

The aim of the research is to investigate potential effects of the finance industry and block-chain to general business of financing in particular, as well as its shortcomings and difficulties. To answer the research questions, the researcher used the objective narrative-analytical descriptive approach and included a qualitative analysis of Blockchain technology. The process of Blockchain technology based on their industries, the authors were selected based on their reputation in the Blockchain field. The research found that Blockchain can improve the efficiency of the banking industry's various sections. It has the ability to upgrade and transfer wages across borders, financial reporting and compliance, as well as trade finance

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Iraq public exposuring to foreign satellites and its effect on the cultural identity
...Show More Authors

The summary of this study is to identify the relation ship between exposuing of the
public to foreign satellites and the degree of cultural of Iraqi public . the danger Iraqi public
exposure to foreign satellite specially some groups of the public are still own limited culture
and ideology without enough conscious to attitude of society . such people cun easily be
controlled by satellites , because these satellites may be the only cultural source for them
which may badly affect their behaviour . This study also aims to identify the level of Iraqi
people exposure to foreign satellites and the types and motivations of that exposure , then to
realize the relationship between exposing to foreign satellites and the cultur

... Show More
View Publication Preview PDF
Publication Date
Wed May 26 2021
Journal Name
Energies
Rotational Piezoelectric Energy Harvesting: A Comprehensive Review on Excitation Elements, Designs, and Performances
...Show More Authors

Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect

... Show More
View Publication
Scopus (19)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
Imam Yahya bin Saeed Al-Ansari and his jurisprudential views on fasting issues
...Show More Authors

In The Name of Allah Most Gracious Most Merciful

 

The reason for choosing this topic was:

 

First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.

 


Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).

 


Third: The study of the jurisprudence of the companions

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (9)
Scopus Crossref
Publication Date
Fri Aug 18 2023
Journal Name
Journal Of Research In Medical And Dental Science
Morphologic Evaluation of the Permanent Mandibular First Molar within an Iraqi Population Using Cone Beam Computed Tomography (Retrospective Study)
...Show More Authors

Preview PDF
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Pregnancy-related Health Behaviors' Change during Pregnancy for Pregnant Women Attending Abo Ghareeb Primary Health Care Sector
...Show More Authors

Objective(s): The study aims at evaluating pregnancy-related health behaviors for pregnant women, and to identify the association between pregnancy-related health behaviors and their demographic characteristics of pregnant woman’s age, education, employment, residential area and monthly income.
Methodology: A descriptive study is carried out for the period from December 14th, 2020 to June 20th, 2021. This study was conducted through a non-probability (convenience) sample of 150 pregnant women attending, Abo Ghareeb primary health care sector in Abo Ghareeb spend. The sample has been collected by using the instrument to gather data and accomplish the study's objectives. A questionnaire is composed of (29) items and it is divided into

... Show More
View Publication Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Journal Of Research In Medical And Dental Science
A Stereomicroscopic Evaluation of Four Endodontic Sealers Penetration into Artificial Lateral Canals Using Gutta-Percha Single Cone Obturation Technique
...Show More Authors

A Stereomicroscopic Evaluation of Four Endodontic Sealers Penetration into Artificial Lateral Canals Using Gutta-Percha Single Cone Obturation Technique, Omar Jihad Banawi*, Raghad

View Publication Preview PDF