Abstract his study involved evaluation of side effects of two weight reduction pills that had been widely distributed in the last period. Two weight reduction compounds are studied, Reductil (containing chemical substances) and Chinese’s weight reduction herbs (containing natural substances). Two doses for each compound are used in this research; 5mg/ml and 0.5mg/ml for Reductil, while 30mg/ml and 10mg/ml for Chinese weight reduction herbs. To evaluate the toxic effects of these compounds, the following parameters were determined which include mitotic index (cytogenetic analysis), serum FSH and LH hormones level (follicles stimulation hormone/FSH and lutenising hormone/LH) and histological examination of female mice ovaries. Control group were treated with PBS for comparison. Results revealed that both compounds showed significant changes with the all studied parameters and at both doses when compared with control and, Reductil was shown to be more toxic than the Chinese herbs.
Background: The finite element method (FEM) is expected to be one of the most effective computational tools for measuring the stress on implant-supported restorations. This study was designed using the 3D-FEM to evaluate the effect of two adhesive luting types of cement on the occlusal stress and deformation of a hybrid crown cemented to a mono-implant. Materials and Method: The mono-screw STL file was imported into the CAD/CAM system library from a database supported by De-Tech Implant Technology. This was to assist in the accurate reproduction of details and design of a simulated implant abutment. Virtually, a digital crown was designed to be cemented on an abutment screw. A minimum occlusal thickness of 1mm and marginal fitting of 1.2
... Show MoreThe molluscicidal effects of herbicide 2, 4-D were studied against tow species of freshwater snail Bulinus truncatus and Melanopsis nodosa by short term experiments. Calculated values of lethal concentrations (LC50 and LC100) were maid to two spices for different period of time 24hr, 48hr, 72hr and 96hr. The study had showed that the herbicide 2, 4-D was toxic against the tow species. The toxicity of the herbicide was low or unknown in low concentrations in the first period of exposure 24and 48hr to two spices but it increase gradually with increase period of exposure. The spice of B.truncatus was more tolerant than the M.nodosa. All the individual of M nodosa was death while in B.truncatus the complete death was not appear until finish the
... Show MoreIn this paper, an intelligent tracking control system of both single- and double-axis Piezoelectric Micropositioner stage is designed using Genetic Algorithms (GAs) method for the optimal Proportional-Integral-Derivative (PID) controller tuning parameters. The (GA)-based PID control design approach is a methodology to tune a (PID) controller in an optimal control sense with respect to specified objective function. By using the (GA)-based PID control approach, the high-performance trajectory tracking responses of the Piezoelectric Micropositioner stage can be obtained. The (GA) code was built and the simulation results were obtained using MATLAB environment. The Piezoelectric Micropositioner simulation model with th
... Show MoreApart from graduating five-star doctors, a particular medical college has the mission to motivate and offer researchers the opportunity to publish high-quality researches on various health problems and disseminate updated medical knowledge to a wide range of local and international readers. This could be accomplished by establishing a medical journal and releasing issues regularly
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThis study was done to find a cheap, available and ecofriendly materials that can remove eosin y dye from aqueous solutions by adsorption in this study, two adsorbent materials were used, the shells of fresh water clam (Cabicula fluminea) and walnut shells. To make a comparison between the two adsorbents, five experiments were conducted. First, the effects of the contact time, here the nut shell removed the dye quickly, while the C. flumina need more contact time to remove the dye. Second, the effects of adsorbent weight were examined. The nut shell was very promising and for all used adsorbent weight, the R% ranged from 94.87 to 99.29. However C. fluminea was less effective in removing the dye with R% ranged from 47.59 to 55.39. The thi
... Show More