Preferred Language
Articles
/
2hd8OI8BVTCNdQwCJ2MD
EFFECT OF SINGLE ORAL DOSE OF FUMONISIN B1 ON IMMUNOHISTOCHEMICAL EXPRESSION OF TLR-2 AND 4 IN MICE
...Show More Authors

Fumonisin B1 is toxic secondary metabolites compound produced by Fusarium spp. on maize and maize products causes health problems to human and animal. Therefore, this research is planned to study the effect of FB1 on the expression of TLR-2 & 4 in liver and kidney cells of mice. Four group of male mice were orally administrated with single dose of FB1 toxin as the following: 0 ppb, 800 ppb, 1200 ppb and 1600 ppb. After two weeks all animals were sacrificed, liver and kidney autopsies were taken and the level of TLR-2 & 4 detected in each four group by immunohistochemistry technique (IHC). According to the IHC examination of groups (1, 2, 3 and 4) strong expression of TLR2 in liver and kidney were (0%, 33.3%, 100%, 100%), respectively. This result shows significant different between these groups P≤ 0.01. The expression of TLR4 for these groups in liver was (0%, 0%, 33.3%, 66.6%). Respectively, and in kidney were (0%, 0%, 50%, 66.6%). Chi square was significantly difference between P ≤ 0.01 these groups. In conclusion, FB1 has a significant effect on TLR-2 and 4 expression in liver and kidney at high doses and the staining was found in cytoplasm and membrane of hepatocyte and kidney tubules.

Scopus
Publication Date
Sun Nov 30 2025
Journal Name
Perinatal Journal
Serum inhibin b as a biomarker for ovarian reserve in Iraqi women with hypothyroidism
...Show More Authors

The condition known as hypothyroidism is common in women, even in those who are fertile. The quantity and caliber of follicles present in the ovary at any one moment are known as the ovarian reserve. Individuals who are susceptible to a decreased ovarian reserve ought to have an assessment of their ovarian reserve conducted. The purpose of this research is to assess the impact of hypothyroidism on Iraqi women's ovarian reserve using Inhibin B hormone and hormone tests FSH, LH. There was no discernible variation in the average (±SD) age from (20 to 40) years of the patient group compared to the control group (p-value 0.08). However the mean BMI of the patients were statistically significantly different from the controls (P- value 0.006).Wom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 26 2022
Journal Name
Petroleum Science And Technology
Building 3D geological model using non-uniform gridding for Mishrif reservoir in Garraf oilfield
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Chemical,biological And Physical Sciences
Study the Electron Drift Velocity in Carbon Dioxide Gas Obtained From Boltzmann Equation Analysis‏
...Show More Authors

Publication Date
Thu Dec 01 2022
Journal Name
Advances In Cancer Biology - Metastasis
CX3CL1 as potential immunotherapeutic tool for bone metastases in lung cancer: A preclinical study
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
Baghdad Science Journal
Smart Flow Steering Agent for End-to-End Delay Improvement in Software-Defined Networks
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Use the target costing in Decrease costing a practical company far AL-Amal Industries
...Show More Authors

The Target costing is an important modern techniques strategic managerial accounting.which is been shown active adoption to changes in contemporary business environments Inaddition,they had been adopted by the units as aresult of the growth in the strategic approach in the man agement..the goal of using target costing is to build and strengthen competitive abilities of economic units thvough introducing appropriate ways to decrease cost and improving quality of product The hypothesis reflects interest in achieving the goal of the research,ie.research question,The hypothesis use target costing to assist economic units to decrease cost and in the manner that leads to competitive advantages while surviving and flourishing in current busines

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Employment aesthetic to the sitting position in contemporary Iraqi Sculpture: سلام محمد سعيد هاشم
...Show More Authors

This paper deals with aesthetic and a sitting position in contemporary Iraqi sculpture and studied this situation, an analytical study to reveal how to employ them in aesthetically pleasing work of art has been research in a sitting position to a lack of technical library for such research, this study includes four chaptersChapter I contains the research problem and its importance in terms of the released address and its objectives in the detection of this situation, how to employ the HDL research is to detect how the aesthetic of the Employment sit position and limits Find business is bronze and stone-dimensional exclusively carried out from 2000 to 2009 AD.Chapter II included the Framework theory and previous studies and with three Inv

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Alustath
"The Common Humanity That is in Us All": Earnest Gaines's (A Lesson before Dying)
...Show More Authors

Gaines's A Lesson Before Dying (1993) is about more than the challenges associated with being blacking an Eurocentric society. Though Gaines positions the story within the context of the African American experience, its central theme investigates what it means to be human. The Afro-American writer Ernest Gaines consistently writes about people who face the problems of being denied humanity, dignity, and self-worth. The article illustrates one man's struggle to gain recognition of his humanity in the court (as his attorney insists on calling him a hog for a crime he did not commit) and how this recognition will initiate a change in the community.

View Publication