This study was carried out to evaluate the hepato-protective property of (Arachis hypogea L.) peanut skin extracts in CCl4 induced hepatotoxicity in mice. The antioxidant activity was measured utilizing 2, 2-diphenyl-1-1 picrylhydrazyl (DPPH) radical scavenging capacity. The results showed that the methanolic extract was the highest free radical scavenging activity than the aqueous extract with values (92.34 ± 0.45 and 87.62 ± 0.44) respectively in 12 mg/mL compared to 89.61 ± 0.34 for Butylated hydroxytoluene (BHT) and 93.25 ± 0.06 for vitamin C, which means that the methanolic extract of peanut skin is superior to BHT. Furthermore, the total phenolic content was analyzed by using Folin-Ciocalteu method, the amount of total phenol in aqueous extract was15.32 ± 0.45, 39.29 ± 0.64 and 56.63 ± 1.03 mg/g in 2, 6 and 10 mg/ml respectively, while the methanolic extract was 47.08 ± 0.56, 68.40 ± 1.18 and 85.35 ± 0.62 mg/g respectively in the same concentrations. The hepato-protective effect of peanut skin extract was evaluated in CCl4 induced hepato-toxicity. The experiment was conducted in two methods: pre-treatment groups and post-treatment groups. Mice were treated with 50 and 100 mg/kg of aqueous and methanolic peanut skin extracts for 35 days before being damaged by CCl4 (pre-treatment group), and the other groups (post-treatment groups) which the mice were injected with CCl4 and received 50 and 100 mg/kg of aqueous and methanolic peanut skin extracts for 35 days. Biochemical studies show that there is decrease in the levels of serum ALT, AST, ALP, MDA and increases in the levels of SOD with significant differences (p <0.01) when compared with the CCl4 treated group. The histo pathological examination of liver obtained from mice with administrated intraperitoneally 3 ml/kg CCl4 showed histopathological changes in the liver represented in fatty changes of excessive hepatocyte accumulation of fatty material, while when treated with 100 mg/kg of peanut extract revealed look like normal structure appearance of hepatic tissue and normal structure appearance but with few apoptotic cells.
An experimental and numerical study was carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition. The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra*=500 for numerical study and for annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to give the governing equation under assumptions that used Darcy law and Boussinesq’s approximation and then it was solved numerically using finite difference approximation. It was found that t
... Show MoreOne of the most common metabolic illnesses in the world is diabetes mellitus. This metabolic disease is responsible for a large percentage of the burden of kidney damage and dysfunction. The goal of this study was to look into the renal function of diabetic patients using metformin monotherapy who came to Mosul's Al-Wafaa diabetes care and research facility. During the period 1 January 2021 to 30 April 2021, 47 patients with T2DM (age 50.48 7.74 years) were enrolled in this case-control study. These patients' results were compared to a control group of 47 seemingly healthy people (age 45.89 9.06 years). All participants' demographic and medical histories were acquired through the delivery of a questionnaire. Blood samples were collected
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe demand for expatriate labor to Iraq increased after 2003 as a result of the openness that Iraq experienced, but this expatriate labor, which was requested at an increasing rate, has had economic, social, and political effects on the Iraqi economy in general, and the Iraqi labor market in particular. This is due to the high rates of unemployment, as most of these expatriate workers cause competition to local labor, and thus cause repercussions on the Iraqi economy as a whole, except for those expatriate workers coming with companies working in the oil sector. Iraq's GDP
In this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
In the present time, radioactive contamination is considered one of the most dangerous types of environmental pollution. It usually takes place because of a leakage of radioactive materials to one of the environment natural components, such as, water, air, and soil. Iraq is considered one of the most contaminated environments in the world; this is closely associated with the wars Iraq had suffered from; especially, in 1991 and 2003. Considering the importance of the radioactive contamination and its different health impacts on the population, the current paper is interested in studying this type of environmental contamination and its impact on the birth defects depending on the data available in the annual reports issued by the Iraqi min
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreIn this paper, the concept of normalized duality mapping has introduced in real convex modular spaces. Then, some of its properties have shown which allow dealing with results related to the concept of uniformly smooth convex real modular spaces. For multivalued mappings defined on these spaces, the convergence of a two-step type iterative sequence to a fixed point is proved