This paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.
The purpose of present study is to evaluate the effect of co-administration of curcumin (CUR) at various doses on the pharmacokinetic (PK) profile of tacrolimus (TAC), a CYP 3A4 substrate in healthy male rabbits. Healthy male rabbits (n=18) were employed in an in vivo, parallel-randomized study. Three groups of rabbits were selected and separated: The rabbits in the first group (control group) received 1 mg/kg TAC orally. Blood samples (1.5-2 mL) were drawn from rabbits' ear marginal veins at the following time frames: 15.0, 30.0, 45.0, 60.0, 90.0, 120.0, 150.0, 180.0 and 300 minutes after TAC administration post dosing and analyzed by using a TAC chemiluminescent enzyme immunoassay (CLIA) detection kit. In the second and third gro
... Show MoreObjectives: The objective of this study was to evaluate serum levels of clusterin (CLU) in type 2 diabetics with and without cardiovascular disease and to explore possible correlations with insulin resistance and related progression of cardiovascular disease in Iraqi men.
Methods: Sixty-three T2DM patients, including forty-two with cardiovascular disease (CVD), were divided into three subgroups; twenty-one with myocardial infraction (MI), twenty-one with other CVD, and twenty-one without any cardiac complication. In addition, a group of twenty-one men served as healthy controls (HCs) for comparison purposes. The four groups were analyzed for parameters that included fasting serum glucose (FSG), l
... Show MoreThe tight gas is one of the main types of the unconventional gas. Typically the tight gas reservoirs consist of highly heterogeneous low permeability reservoir. The economic evaluation for the production from tight gas production is very challenging task because of prevailing uncertainties associated with key reservoir properties, such as porosity, permeability as well as drainage boundary. However one of the important parameters requiring in this economic evaluation is the equivalent drainage area of the well, which relates the actual volume of fluids (e.g gas) produced or withdrawn from the reservoir at a certain moment that changes with time. It is difficult to predict this equival
Fungi produce a series of toxic compounds on corn, especially Fumonisin B1 (FB1) toxin produced by Fusarium spp. and promoting cancer activity in humans and animals. This study aimed to the isolation and identification of fungi associated with local corn seeds and the detection for the presence of FB1 by using ELISA technique. Thirty samples of corn ears were collected from silos and markets in Baghdad city during the period from November 2018 to March 2019. The present study found that Fusarium was the dominant isolate among fungi in terms of the relative density 57.07%, followed by Aspergillus 31.17%, Rhizopus 3.36%, Alternaria 2.88%, Mucor 2.16%, Penicillium 1.92%, Trichothecium 0.96%, and Helminthosporium 0.48%. FB1 was detected in a
... Show MoreIn this work, the possibility to use new suggested carriers (D= Aspirin, Ibuprofen, Paracetamol, Tramal) is discussed for diclofenac drug (voltarine) by using quantum mechanics calculations. The calculation methods (PM3) and (DFT) have been used for determination the reaction path of (O-D) bond rupture energies. Different groups of drugs as a carrier for diclofenac prodrugs (in a vacuum) have been used; at their optimized geometries. The calculations included the geometrical structure and some of the physical properties, in addition to the toxicity, biological activity, and NLO properties of the prodrugs, investigated using HF method. The calculations were done by Gaussian 09 program. The comparison was made for total energies of reactan
... Show MoreThe article describes a certain computation method of -arcs to construct the number of distinct -arcs in for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each cons
... Show MoreOne of the goals of adding adjuvants to agricultural spray solutions is to enhance the droplet size characteristics of this spray. Droplet size, in turn, has an influence in the deposited spray quality, in addition to the drift and losses of spray to off-target places. The aim of this research was to evaluate the effect of adding adjuvants to two types of water from different sources on the droplet size characteristics. Two types of adjuvants were employed in the tests: the active substance content of the first adjuvant was a 50% aqueous solution of sodium salt of alkylbenzenesulfonic acid—10% (HY), whereas the second was from rapeseed oil (natural origin)—85% (OL). Both adjuvants were tested in two concentrations: the first was
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More