Potential health and environmental effects of nanoparticles need to be thoroughly assessed before their widespread commercialization. The present investigation was planned with the aims to determine the effects of gold nanoparticles (GNPs) on blast (BI) and mitotic (MI) indices of cultured lymphocytes. The results revealed that BI (50.3±2.3, 30.2±1.9, 10.5±0.7 and 0.0%, respectively) and MI (70.1±2.9, 20.4±1.1, 5.3±0.1 and 0.0%, respectively) showed a gradual decreased percentage as the concentration of GNPs was increased from 0.085 to 0.66 µg/mL, and the difference was significant compared to control culture (81.6±2.5 and 90.2±3.7%, respectively). A maximum inhibition of BI and MI was occurred at the concentration 0.66 µg/mL. In conclusion, GNPs can be considered as a growth inhibiting agent, but it is too early to reach a final conclusion in this regard and further investigations are required to elucidate the biochemical mechanisms involved in inhibiting the mitotic activity of lymphocytes.
Personal intelligence is thinking about an other person , understanding him, have sympathy and differentiation between people, and to appreciate their own point of view, with the sensitivity to their motives, behavior, and goals, so this intelligence involves dealing with a person or group of persons effectively and in normal or logical manner.
Emotions management is to achieve emotional balance by controlling the emotions continuously, self disciplining, keeping away from excitement sources, and dealing with bad situations in constructive way to achieve the psychological stability .
- the study aims
KE Sharquie, MM Al-Waiz, AA Noaimi, Iraqi Postgraduate Medical Journal, 2008 - Cited by 1
Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show MoreBackground:: Infertility is a very common condition affecting approximately 13-14% of couples in the reproductive age. In general population; about 85% of couples have achieved conception within a year. Intrauterine insemination is one of the procedure which have a role in the treatment of infertile couple.Objectives:is to confirm that the use of ovulation induction in the course of intrauterine insemination elevates the pregnancy success rate.Method:This study had been conducted between December 2013 till December 2014 in AL-Elwiyah maternity hospital and AL-Samaraii hospital / Baghdad.On history and clinical examination; the chosen couple had the following criteria; primary infertility for more than one year, no previous IUI trials, hu
... Show MoreIn this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex.
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThe solar eclipse occurs at short time before the crescent birth moment when the moon near any one of moon orbit nodes It is important to determine the synchronic month which is used to find Higree date. The 'rules' of eclipses are:
Y= ± 0.997 of Earth radius , the solar eclipse is central and 0.997 < |Y| < 1.026 the umbra cone touch the surface of the Earth, where Y is the least distance from the axis of the moon's shadow to the center of the Earth in units of the equatorial radius of the Earth.
A new model have been designed, depend on the horizontal coordinates of the sun, moon, the distances Earth-Moon (rm), Earth-sun (rs) and |Y| to determine the date and times of total solar eclipse and the geogra
... Show More