In fish, a complex set of mechanisms deal with environmental stresses including hypoxia. In order to probe the hypothesis that hypoxia-induced stress could be manifested in varieties of pathways, a model species, mirror carp (Cyprinus carpio), were chronically exposed to hypoxic condition (dissolved oxygen level: 1.80±0.6mg/l) for 21 days and subsequently allowed to recover under normoxic condition (dissolved oxygen level: 8.2±0.5mg/l) for 7 days. At the end of these exposure periods, an integrated approach was applied to evaluate several endpoints at different levels of biological organisation. These included determination of (i) oxidative damage to DNA in erythrocytes (using modified comet assay), (ii) lipid peroxidation in liver samples by measuring the malondialdehyde production using the 2-thiobarbituric acid [i.e. thiobarbituric acid reactive substances (TBARS) assay] and (iii) histopathological changes in gills. In addition, transcriptional expression of hypoxia-inducible factor 1 α (HIF-1α) and genes involved in the repair of oxidative damage to DNA (i.e. ogg1) and base excision repair (i.e. xrcc1) using reverse transcription polymerase chain reaction in liver samples were also determined. The results suggested significantly enhanced expression of these genes in response to hypoxia compared to concurrent normoxic controls. While the expression of HIF-1α reverted to control values within 7 days exposure to normoxic condition (P < 0.05), the transcriptional expression of the two genes involved in DNA repair process remained significantly high under the recovery period, which complemented the induction of oxidative damage to DNA. Hypoxic groups showed significantly increased values for TBARS level (~2-fold) and histopathological changes in gill tissues compared to both normoxic and recovery groups. Overall, oxidative damage to DNA determined by modified comet assay reflected the observed biological responses in other tissues of the fish. Along with other parameters, this integrated experimental design further strengthens the applications of the comet assay as an important technique to assess stress-induced DNA damage in ecotoxicological studies. © The Author 2014. Published by Oxford University Press on behalf of the UK Environmental Mutagen Society.
In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
Owing to their remarkable characteristics, refractory molybdenum nitride (MoN x )-based compounds have been deployed in a wide range of strategic industrial applications. This review reports the electronic and structural properties that render MoN x materials as potent catalytic surfaces for numerous chemical reactions and surveys the syntheses, procedures, and catalytic applications in pertinent industries such as the petroleum industry. In particular, hydrogenation, hydrodesulfurization, and hydrodeoxygenation are essential processes in the refinement of oil segments and their conversions into commodity fuels and platform chemicals. N-vacant sites over a catalyst’s surface are a significant driver of diverse chemical phenomena. Studies
... Show MoreTarget costing is one of the modern techniques in strategic Management accounting, Is has shown active adoption to changes in current business environments, In addition, is has seen a growth in strategic approach, The goal of using target costing is to build and strengthen competition abilities of economic units through introducing appropriate ways to decrease cost values while maintaining and improving quality of product, So this study is aim to show how can economic units use target costing to achieve competitive advantages .
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThe aim of the study is to identify the barriers to dietary compliance among diabetic patients.
Methodology: The sample of the study consist of 100 patients who were divided into two groups according to
the type of diabetes mellitus; type 1 (Insulin-dependent diabetic mellitus), and type n (Non-Insulin dependent
diabetes mellitus). Each group consists of 50 patient selected randomly at each visit to Al-Waffa center in Mosul
city during the period from (1-12-2005) to (1-2-2006).
The steps of the study include recording the different barriers for diabetic patients. The questionnaire
was used and special list was utilized for such purpose.
Results: The results shows that there were some barriers most common such as both
God urged to read the Holy Qur’an and to ponder it is commanded, and the Most High said: That they ponder over His verses and that those with insights remember ().
And this book that God Almighty sent down to the heart of His Prophet, peace and blessings be upon him, is as clear as the sun and the moon.
It is a book of guidance and the constitution of a nation that is the best nation brought forth for mankind, and God has taken care of its preservation as He said: We have sent down the Remembrance, and we are its guardians.
This has been chosen for this topic (Luqman's commandments to his son) for what we see today in our time and society from the loss of morals and values and the neglect of parents to their chi
The first thing that comes to mind is the highly important question of whether there were some effects of human behavior and its fluctuations on the theories of the efficient market and the contemporary investment portfolio. According to what has been said by the proponents of these two theories; when the optimal return is realized, the efficiency of the market is achieved in terms of perfect information on prices and risk that supposed to be predetermined in a rational way.
he other question that imposed here is “at what time people should be rational in their investments in the security markets ?”. This means that investors are rational for their efforts devoted to utility maximization, which are p
... Show MoreIn this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.
In this paper, the concept of a hyper structure KU-algebra is introduced and some related properties are investigated. Also, some types of hyper KU-algebras are studied and the relationship between them is stated. Then a hyper KU-ideal of a hyper structure KU-algebra is studied and a few properties are obtained. Furthermore, the notion of a homomorphism is discussed.
The husband’s discipline of his wife is a right prescribed by the Sharia, but it is conditioned discipline with conditions that make this discipline intended to preserve the family institution from disintegration and scattering, so the Islamic Sharia entrusted the husband, the guardian of the family, with the task of disciplining the disobedient and disobedient wife and deviating from the family’s values and constants of mutual respect and obedience in what is good. And a sense of responsibility. This discipline goes through three sequential stages, starting with exhortation and dialogue, passing through abandonment in the beds, and ending with beating. As for the sermon, it is a quiet dialogue followed by a threat of abandonme
... Show More