Background: Entamoeba histolytica is the causative agent of amoebic dysentery and hepatic abscesses. Despite the efficacy of metronidazole in alleviating infectious diseases, the global dissemination of drug-resistant parasites raises the possibility that Punica granatum could serve as an effective natural alternative treatment. Objective: To evaluate the effect of P. granatum methanolic and aqueous extracts of various parts against E. histolytica trophozoites in an in vitro setting. Methods: Various concentrations (0.14, 0.7, 1.4, and 2.8 mg/ml) of P. granatum extracts of the flowers, leafs, peels, and seeds were chosen for this purpose. A culture medium containing 0.05x106/ml E. histolytica trophozoites was treated with different concentrations of these extracts. The incubation period was 48 hours at 37°C. For every set, an untreated control was also performed. The standard medication metronidazole (17 μg/ml) was employed as a comparative control. Results: All parts of P. granatum showed high efficacy against E. histolytica trophozoites, but utilization of the methanolic extract proved to be quite effective compared to aqueous extract. Under a light microscope, several morphological changes were also seen. These include changes to the plasma membrane, reorganization of vacuoles that hold cell waste, and major changes to the cytoplasmic granules. Conclusions: The leaf, seed, flower, and peel extracts of P. granatum effectively inhibit the growth of E. histolytica trophozoites in vitro. The use of methanolic extract was more effective compared to the aqueous extract, and can be used as a natural alternative treatment for amoebic dysentery.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreEmpirical equations for estimating thickening time and compressive strength of bentonitic - class "G" cement slurries were derived as a function of water to cement ratio and apparent viscosity (for any ratios). How the presence of such an equations easily extract the thickening time and compressive strength values of the oil field saves time without reference to the untreated control laboratory tests such as pressurized consistometer for thickening time test and Hydraulic Cement Mortars including water bath ( 24 hours ) for compressive strength test those may have more than one day.
This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreThe current research aims to identify the level of both psychological comfort and job performance among a sample of high school teachers for the academic year (2019-2020). The researcher has built two tools to measure psychological comfort, and one to measure job performance. The researcher applied the two scales to a random stratified sample of (100) male and female teachers. The results showed a low level of feeling with psychological comfort among secondary school teachers and a good level of sense of job performance. There is no statistically significant difference in the level of psychological comfort according to gender. There is a significant difference in psychological comfort according to the variable of the length of service in
... Show MoreA new four series of 2,2′-([1,1′- phenyl or biphenyl]-4,4′-diylbis(azanediyl)) bis(N′-((E)-1-(4-alkoxyphenyl) ethylidene) acetohydrazide) [V-XI]a,b and 1,1′-(2,2′-([1,1′- phenyl or biphenyl]-4,4′-diyl bis(azanediyl)) bis- (acetyl)) bis(3-(4-ethoxyphenyl)-1H-pyrazole-4-carbalde hyde) [XII-XVIII]a,b have been synthesized by varying terminal lateral alkoxy chain length (n = 1–3, 5–8), central linkage group (phenyl or biphenyl) and induced pyrazole heterocyclic ring in the main chain. The last two series were synthesized by the cyclization of substituted acetophenone hydrazones with Vilsmeier–Haack reagent (DMF/POCl3) to produce 4-formylpyrazole derivatives. The chemical structures of the synthesized compounds were examine
... Show MoreAbstract: Facial defects resulting from neoplasms, congenital, acquired malformations or trauma can be restored with facial prosthesis using different materials and retention methods to achieve life-like look and function. A nasal prosthesis can re-establish aesthetic form and anatomic contours for mid-facial defects, often more effectively than by surgical reconstruction as the nose is relatively immobile structure. For successful results, lot of factors such as harmony, texture, color matching and blending of tissue interface with the prosthesis are important. The aim of this study is to describe the non-surgical rehabilitation with nasal prosthesis for an Iraqi patient who received rhinectomy as a result of squamous cell carcinoma of the
... Show More