The effect of spices mixture on blood glucose and lipids profile in oxidative
stress rabbits was studied. Twenty female rabbits were randomly divided into four
groups (five animals in each group). The first group was subjected to oxidative
stress by the ad libitum supply of drinking water containing 0.5% H2O2. The second
group was supplied with pellets containing 20% spices mixture. The spices mixture
is composed of cinnamon, turmeric and cumin powder. The third group was
subjected to H2O2 (0.5%) and supplied with pellets containing 20% spices mixture.
The last group was considered as control and supplied with pellets and water. The
period of experiment was lasted for 21 days.
The results showed that there was
Pre-eclampsia complicates 2-8% of all pregnancies and it is one of the leading causes of maternal mortality and pre-term delivery in the world. Unfortunately, there is scarcity of documents discussing the circulating level of several essential trace elements in Pre-eclampsia patients in Baghdad especially in the last trimester of the pregnancy. The present study was designed to quantitative evaluation the whole blood concentration of two trace elements, copper (Cu), and iron(Fe), in pre-eclamptic women in the third trimester of pregnancy. The study was conducted on 18 Pre-eclamptic pregnant women as patients group with clinical detected high blood pressure ≥140/90 mmHg and 13 normotensive pregnant women as control group from Al-Alwiya
... Show MoreThis paper aims to introduce a concept of an equilibrium point of a dynamical system which will call it almost global asymptotically stable. We also propose and analyze a prey-predator model with a suggested function growth in prey species. Firstly the existence and local stability of all its equilibria are studied. After that the model is extended to an optimal control problem to obtain an optimal harvesting strategy. The discrete time version of Pontryagin's maximum principle is applied to solve the optimality problem. The characterization of the optimal harvesting variable and the adjoint variables are derived. Finally these theoretical results are demonstrated with numerical simulations.
The Early Cenomanian Ahmadi carbonates succession in selected oil-wells in south Iraqi oil fields have undergone; into sequence stratigraphic analysis as new reservoir stratigraphy optimization understanding. The sequence stratigraphy context: has applied on the mentioned carbonate reservoir in selected oil-wells from West-Qurna and Majnoon oil fields, with respect to Arabian-plate (AP) chronosequence stratigraphy and chrono-markers setting.
A meso-genetic buildup has infra-structured the studied Formation based-on; smallest-set of the genetically-related high-frequency lithofacies-cycle and cycles-set modeling. A genetic sequence (meso-sequence one MS1) is described as a well-encountered buildup between the (MFS-K120 of lower Ah
... Show MoreAbstract This research investigates how activated carbon (AC) was synthesized from potato peel waste (PPW). Different ACs were synthesized under the atmosphere's conditions during carbonation via two activation methods: first, chemical activation, and second, carbon dioxide-physical activation. The influence of the drying period on the preparation of the precursor and the methods of activation were investigated. The specific surface area and pore volume of the activated carbon were estimated using the Brunauer–Emmett–Teller method. The AC produced using physical activation had a surface area as high as 1210 m2/g with a pore volume of 0.37 cm3/g, whereas the chemical activation had a surface area of 1210 m2/g with a pore volume of 0.34 c
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show More16S rRNA gene sequence examination is an effective instrument for characterization of new pathogens in clinical specimens. Akey component of colonization, biofilm formation, and protection of the pragmatic human pathogen Pseudomonasaeruginosais the biosynthesis of the exopolysaccharide Psl.Extracellular polysaccharides,biofilm, are secreted by microorganisms into the neighboring environment and are significant for surface attachment and keeping structural safety within biofilms.Biofilm production is an important technique for the survival of P. aeruginosa,and its association with antimicrobial resistance represents a defy for patient therapeutics. The aim of the current research is to assess the antibiotic resistance manner and distribution
... Show MoreAsthma is a chronic inflammatory disease affecting 5% of the world population. FKBP51 is an important immunophilin modular protein of the glucocorticoid receptor (GC).
The aim of the present study was to evaluate the levels and immunocytochemical distribution of FKBP51 and GR in lymphocyte cells of asthmatic patients, by use of immunocytochemistry method, and to assesslevels ofstress hormones (cortisol and ACTH) by radioimmuniassay (RIA).
The results showed significantly increased nuclear localization and decreasedcytoplasmic distribution of FKBP51, while they showed a significant increase in nuclear localization and a non-significant decrease in cytoplasmic distribution of GRin asthmatic patients(P<0.05).
Cort
... Show MoreA seismic study was conducted to re-interpret the Qasab and Jawan Oil fields in northwestern Iraq, south of the city of Mosul, by reprocessing many seismic sections of a number of field surveys by using the Petrel software. Two reflectors, represented by the Hartha formation, deposited during the Cretan age, and the Euphrates formation, formed during the Tertiary age, were delineated to stabilize the structural picture of these fields.
The stratigraphic study showed that the Qasab and Jawan fields represent areas of hydrocarbon accumulation. Seismic attribute analysis showed low values of instantaneous frequency in the areas of hydrocarbon accumulation. Instantaneous phase was used to determine the limits
... Show MoreThe current study included the preparation of the aqueous extract of Raphanus sativus (Brassicaceae), commonly known as radish which is widely available throughout the world and has been used in folk medicine as a natural drug against many toxicants. The study was designed to evaluate the in vivo cytogenetic activity of the crude aqueous extract of R. sativus on mitosis on Allium cepa root tips as a plant test system. Root tips of A. cepa were tested for four hours with four concentrations of the crude aqueous extract (0.00, 5, 10, 20, 40 mg/ml). The study included a number of cytogenetic analyses such as mitotic index, phase index, and chromosomal aberration. The data s
... Show MoreSince oil is the primary source of vanadium in the environment and crude oil has a correspondingly high percentage of vanadium. Vanadium is crucial as a sign of oil contamination. Twenty soil samples were taken from various locations surrounding the East Baghdad oil field in Iraq during February 2022 and then analyzed to determine the effects of industrialization along with urbanization-related pollutants. The soil samples were analyzed using spectrophotometry analysis. In soil samples taken from the research area, vanadium concentrations range from (0.26 to 1.2 ppm). The contamination (CF), geoaccumulation (Igeo) and Enrichment factors (EF) indicated that all the soil samples are uncontaminated.
This paper aimed to determine the Optimal Reliable Frequency (ORF) that can maintain certain connection link between different transmitter/receiver stations laid over the Iraqi territory. Three different transmitting sites were chosen as tested stations located in the northern, central, and southern regions of Iraq. These sites are Mosul, Baghdad, and Basra, respectively. In this study, the years 2009 and 2014, which represent the minimum and maximum years of solar cycle 24, were chosen to examine the effect of low and high solar activity on the determined ORF. The datasets of the Best Usable Frequency (BUF) were calculated using the ASAPS international communication model. An analytical study was made on the generated BUF parameter data
... Show MoreBackground: Ischemic heart disease is a major cause of the diastolic heart failure. Risk of heart failures was increased with microvascular coronary disease, which is characterized by left ventricular stiffness with impaired relaxation and reduced compliance. Aim of this study is to estimate the effect of the severity of myocardium ischemia on the left ventricle ejection fraction and left ventricular volume using SPECT with 99mTc MIBI and to compare the results with the echocardiography. The study included 117 subjects with ischemic heart disease were examined using SPECT and echocardiography techniques. The following
... Show MoreZinc Oxide thin film of 2 μm thickness has been grown on glass substrate by pulsed laser deposition technique at substrate temperature of 500 oC under the vacuum pressure of 8×10-2 mbar. The optical properties concerning the absorption, and transmission spectra were studied for the prepared thin film. From the transmission spectra, the optical gap and linear refractive index of the ZnO thin film was determined. The structure of the ZnO thin film was tested with X-Ray diffraction and it was formed to be a polycrystalline with many peaks.
In this paper, we introduced some new definitions on P-compact topological ring and PL-compact topological ring for the compactification in topological space and rings, we obtain some results related to P-compact and P-L compact topological ring.
The level of thyroid autoantibodies between type 1 and type 2 diabetes mellitus
patients in Baghdad City were investigated.
Fifty individuals (25 female and 25 male) with type-1 DM in the age group of 10
to 35 years and seventy (35 female and 35 male) of having type-2 DM in the age
group of 33 to 60 years were investigated. A control group of twenty-five nondiabetes
was included. Serum sample collected was used to estimate anti-TPO, TG
and thyroid stimulating hormone antibodies (thyroid stimulating immunoglobulin
TSI and thyrotropin binding inhibitory immunoglobulin TBII) by using enzymelinked
immunosorbent assay (ELISA) technique.
The results show that there is a significant (p< 0.05) increase in the level
Keratinases are enzymes belonging to the serine hydrolases group which are capable of degradation of keratin, an insoluble and fibrous structural protein widely cross-linked with hydrogen, disulfide, and hydrophobic bonds. Attempts to find new sources of enzymes and amino acids for fundamental knowledge of enzyme evolution, structure‐function relationships, catalysis mechanisms of enzymes, and even for the identification of novel protein folds. In this study, seventy-nine samples were collected from different places in the University of Baghdad, and the best isolate for amino acid production by feathers degradation was by using Streptomyces venezuelae AZ15. The best fermentation system and the optimum culture condit
... Show MoreLet be a unitary left R-module on associative ring with identity. A submodule of is called -annihilator small if , where is a submodule of , implies that ann( )=0, where ann( ) indicates annihilator of in . In this paper, we introduce the concepts of -annihilator-coessential and - annihilator - coclosed submodules. We give many properties related with these types of submodules.
The peristaltic flow of Walter's B fluid through an asymmetric channel is analyzed. The constitutive equation for the balance of mass, momentum, trapped phenomena, and velocity distribution is modeled. Consideration of low Reynolds number and long wavelength assumption are used in the flow analysis to get an exact solution by using the perturbation method. The impact of impotent parameters on stream function and axial velocity has been gained. The set of figures is graphically analyzed of these parameters.
Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct
The Non-Photorealistic Rendering (NPR) demands are increased with the development of electronic devices. This paper presents a new model for a cartooning system, as an essential category of the NPR. It is used the concept of vector quantization and Logarithmic Image Processing (LIP). An enhancement of Kekre Median Codebook Generation (KMCG) algorithm has been proposed and used by the system. Several metrics utilized to evaluate the time and quality of the system. The results showed that the proposed system reduced the time of cartoon production. Additionally, it enhanced the quality of several aspects like smoothing, color reduction, and brightness.
In this paper, a discrete- time ratio-dependent prey- predator model is proposed and analyzed. All possible fixed points have been obtained. The local stability conditions for these fixed points have been established. The global stability of the proposed system is investigated numerically. Bifurcation diagrams as a function of growth rate of the prey species are drawn. It is observed that the proposed system has rich dynamics including chaos.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThis study presents the determination of the paleostress magnitudes and orientation of Bekhme Structure in Shaqlawa area, northeastern Iraq. Paleostress analysis of slip-fault measurements is performed using Right dihedral, Lisle diagram, and Mohr Circles methods. Depending on Mohr Circles, Bott law, and vertical thickness, the magnitudes of the paleostress at the time of the tectonic activity were determined. Firstly, Georient Software was used to estimate the orientation of the paleostresses (σ1, σ2, and σ3). Secondly, using the rupture –friction law, taking into account the depth of the overburden and the vertical stress (σv),the magnitudes of the paleostresses were calculated (σ1=4500 bars, σ2=1900 bars and σ3=700 bars). &nb
... Show MoreWe develop the previously published results of Arab by using the function under certain conditions and using G-α-general admissible and triangular α-general admissible to prove coincidence fixed point and common fixed point theorems for two weakly compatible self –mappings in complete b-metric spaces.
Stemming is a pre-processing step in Text mining applications as well as it is very important in most of the Information Retrieval systems. The goal of stemming is to reduce different grammatical forms of a word and sometimes derivationally related forms of a word to a common base (root or stem) form like reducing noun, adjective, verb, adverb etc. to its base form. The stem needs not to be identical to the morphological root of the word; it is usually sufficient that related words map to the same stem, even if this stem is not in itself a valid root. As in other languages; there is a need for an effective stemming algorithm for the indexing and retrieval of Arabic documents while the Arabic stemming algorithms are not widely available.
... Show MoreEstablishing coverage of the target sensing field and extending the network’s lifetime, together known as Coverage-lifetime is the key issue in wireless sensor networks (WSNs). Recent studies realize the important role of nature-inspired algorithms in handling coverage-lifetime problem with different optimization aspects. One of the main formulations is to define coverage-lifetime problem as a disjoint set covers problem. In this paper, we propose an evolutionary algorithm for solving coverage-lifetime problem as a disjoint set covers function. The main interest in this paper is to reflect both models of sensing: Boolean and probabilistic. Moreover, a heuristic operator is proposed as a local refinement operator to improve the quality
... Show More