Preferred Language
Articles
/
7RewYo8BVTCNdQwCpnRT
In-vitro effect of artemisinin on L. tropica promastigotes
...Show More Authors

Leishmaniasis is a widespread parasitic disease caused by Leishmania parasite, this disease considers a major health problem among worldwide. Treatments available are expensive or with cytotoxic side effect. This study was aimed to investigate the effect of an herbal new compound, called artemisinin, derived from a Chinese plant called Artemisia annua. Various concentrations were studied in vitro against L. tropica amastigotes by chamber counting to investigate its effect on the proliferation of promastigotes. Three incubation periods were adopted (24, 48, 72) hours. The results showed a significant decrease in surviving promastigotes, in parallel with the normal parasite count of untreated promastigotes, along the periods studied. This study revealed a major growth inhibition effect of artemisinin against L. tropica promastigotes, in vitro. It is recommended for future studies of artemisinin effects on amastigotes forms and in vivo study.

Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
An update on Nanoparticle Formulation Design of Piperine to Improve its Oral bioavailability: A Review
...Show More Authors

Piperine, a crystalline alkaloid compound isolated from Piper nigrum, piper longum, and other types of piper, has had many fabulous pharmacological advantages for preventing and treating some specific diseases, such as analgesic, anti-inflammatory, hepatoprotective, antimetastatic, antithyroid, immunomodulatory, antitumor, rheumatoid arthritis, osteoarthritis, Alzheimer's, and improving the bioavailability of other drugs. However, its potential for clinical use through oral usage is hindered by water solubility and poor bioavailability. The low level of oral bioavailability is caused by low solubility in water and is photosensitive, susceptible to isomerization by UV light, which causes piperine concentration to decrease. Many different

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Economics And Administrative Sciences
Impacting Digital Competence on Entrepreneurial Alertness: An Analytical Research at the Central Bank of Iraq
...Show More Authors

In the era of the digital economy, public organizations need to consolidation the capabilities of entrepreneurial alertness to reduce the risks of sudden transformations and changes, and to find effective mechanisms to discover and invest in environmental opportunities proactively, as this concern has become a knowledge gap in public sector institutions, the current research aims to identify the role of digital competence in influencing on entrepreneurial alertness in the Central Bank of Iraq (CBI), the descriptive analytical approach was used as a research method to describe and analyze the main research variables. digital competence as an explanatory variable includes three dimensions: digital infrastructure, digital integration, and d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of International Society Of Preventive And Community Dentistry
The impact of dental environment stress on dentition status, salivary nitric oxide and flow rate
...Show More Authors

View Publication
Scopus (18)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Comparison of Single and Group Bored Piles Settlement Based on Field Test and Theoretical Methods
...Show More Authors

 Bored piles settlement behavior under vertical loaded is the main factor that affects the design requirements of single or group of piles in soft soils. The estimation of bored pile settlement is a complicated problem because it depends upon many factors which may include ground conditions, validation of bored pile design method through testing and validation of theoretical or numerical prediction of the settlement value. In this study, a prototype single and bored pile group model of arrangement (1*1, 1*2 and 2*2) for total length to diameter ratios (L/D) is 13.33 and clear spacing three times of diameter, subjected to vertical axial loads. The bored piles model used for the test was 2000

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE USE OF ULTRAVIOLET RAYS TO PRESERVE FERMENTED GREEN OLIVES AND ITS EFFECTS ON CHEMICAL PROPERTIES OF ITS EXTRACTED OIL : THE USE OF ULTRAVIOLET RAYS TO PRESERVE FERMENTED GREEN OLIVES AND ITS EFFECTS ON CHEMICAL PROPERTIES OF ITS EXTRACTED OIL
...Show More Authors

The use of ultraviolet rays is one of the methods of treating surface contamination of many foods especially pickles. however, there are some side effects to its use, especially in high percentage oil food products, it is necessary to determine the appropriate doses and time periods to avoid deterioration of its oil physicochemical characteristics. this study was conducted to see the effect of ultraviolet rays 15W on some chemical properties of olive oil when using it to preserve green olive pickles, treated for 5, 10 and 15 min daily. green olive fruits Iraqi variety (al-ashrasi), in season (2020-2021) were pickled using Spanish style, the best time period to pr

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Multifocus Images Fusion Based On Homogenity and Edges Measures
...Show More Authors

Image fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
On Skew Left n-Derivations with Lie Ideal Structure
...Show More Authors

In this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and  the commutativity of Lie ideal under certain conditions were proved.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref