Background: Obesity is becoming the healthcare epidemic world wide.Obesity is associated with reduced life expectancy, increased morbidity and mortality, and greater healthcare costs.Bariatric surgery is the only effective treatment for morbid obesity and is gaining increasing popularity. There has been a steady rise in the numbers and types of bariatric operations done worldwide in recent years butnon of prove to be ideal .Animal studies and use of animal models are significant element in the evolution of medical knowledge and the use of animals as a model for bariatric surgery is of importance to study the mechanisms of these operationsa and also help to develop new technique in management of obesity.Objectives:Study of effects of sleeve gastrectomy as bariatric surgery procedures on weight of dietary induced obese rats (DIO).Methods:Eighteen adult rats with diet induced obesity (DIO) divided into two groups, the first (n=9) group exposed to sleeve gasterectomy (SG)under general anesthesia , the second(n=9) is the sham (control) group. Postoperative care of the animals done as required and the weight of the rats were measured weekly for 6 weeks .Results:. Follow up for 6 weeks post-operative . Four rats from SG group were died: two in the first day , second and 6th post operative day .Postmortem done with evidence of gastric leak in two of them. Two sham operated rats were died. The dead rats were cancelled from the study when body weight calculated. Average weight were 425gram and 420gram for SG and Sham respectively before surgery. Both groups experience some weight loss in the first week after surgery while the SG group start losing more weight , while the sham group are starting to maintain its normal weight until the end of the experiment.Conclusions:. Sleeve Gastrectomy as a bariatric procedure are successfully reduce the weight of DIO rats . Development of animal model for bariatric procedure is of great importance to test the effects of different bariatric procedures on the weight, and translate these procedures on human.
The purpose of this paper is to apply different transportation models in their minimum and maximum values by finding starting basic feasible solution and finding the optimal solution. The requirements of transportation models were presented with one of their applications in the case of minimizing the objective function, which was conducted by the researcher as real data, which took place one month in 2015, in one of the poultry farms for the production of eggs
... Show MoreBrowse Iraqi academic journals and research papers
This paper aims to explain the effect of workplace respect on employee performance at Abu Ghraib Dairy Factory (AGDF). For achieving the research aim, the analytical and descriptive approach was chosen using a questionnaire tool for collecting data. It covers 22 items; ten of them for the workplace respect variable and twelve items for the employee performance variable. The research population involved human resources who work at AGDF in Baghdad within two administrative levels (top and middle). We conducted a purposive stratified sample approach. It was distributed 70 questionnaire forms, and 65 forms were received. However, six of them had missing data and did not include in the final data analysis. The main results are t
... Show MoreIn the present work, a density functional theory (DFT) calculation to simulate reduced graphene oxide (rGO) hybrid with zinc oxide (ZnO) nanoparticle's sensitivity to NO2 gas is performed. In comparison with the experiment, DFT calculations give acceptable results to available bond lengths, lattice parameters, X-ray photoelectron spectroscopy (XPS), energy gaps, Gibbs free energy, enthalpy, entropy, etc. to ZnO, rGO, and ZnO/rGO hybrid. ZnO and rGO show n-type and p-type semiconductor behavior, respectively. The formed p-n heterojunction between rGO and ZnO is of the staggering gap type. Results show that rGO increases the sensitivity of ZnO to NO2 gas as they form a hybrid. ZnO/rGO hybrid has a higher number of vacancies that can b
... Show MoreBackground: The healing process involves the restoration of the body’s structural integrity. The extracellular matrix, blood cells, cytokines, and growth factors are all involved in this dynamic, intricate, multicellular process. Hemostasis, the inflammatory phase, the proliferative phase, and the maturation phase are all included. Opuntia ficus-indica oil (OFI) and Punica grantum (PGS) oil are extensively used natural treatments that are regarded as advantageous for their sedative, spasmolytic, and anti-inflammatory properties, as well as for angiogenesis promotion, fibroblast increase, collagen production and deposition, and extracellular-matrix remodeling. Materials and methods: Twenty-four New Zealand rab
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More