Cyclophosphamide is chemotherapeutic agent that utilized for the treatment of different malignancies; however its’ used associated with numerous adverse effects. Vitamin B2 and vitamin B12 suggested having myeloprotective effect. This work is designed to investigate the myeloprotective effect of both vitamins against cyclophosphamide induced myelosuppression. One hundred adult rats of both sexes were used in this study. The animals were randomly enrolled into ten groups of 10 rats each. Group I: Control group. Group II: Cyclophosphamide-treated. Group III and Group IV Orally-administered vitamin B2 (10, and 40 mg/kg/day), respectively alone for 7 days. Group V: Orally-administered vitamin B12 (0.1 mg/kg/day) alone for 7 days. Group VI and Group VII: Orally-administered vitamin B2 (10, and 40 mg/kg/day), respectively for 7 days and a single IP injection of cyclophosphamide (150 mg/kg) at day 7.Group VIII: Orally-administered vitamin B12 (0.1 mg/kg/day) for 7 days and a single IP injection of cyclophosphamide (150 mg/kg) at day 7. Group IX: Orally-administered a combination of vitamin B2 (10 mg/kg/day) and vitamin B12 (0.1 mg/kg/day) for 7 days and a single IP injection of cyclophosphamide (150 mg/kg) at day 7. Group X: orally-administered a combination of vitamin B2 (40 mg/kg/day) and vitamin B12 (0.1 mg/kg/day) for 7 days and a single IP injection of cyclophosphamide (150 mg/kg) at day 7. On day eight, animals were sacrificed and blood collected for CBCs and femur bone were extracted for bone marrow histological examination. Vitamin B2 and vitamin B12 significantly (P<0.05) increase CBCs; and the combination of vitamins produce -a significant (P<0.05) increase in CBCs compared to corresponding counts in other Groups, and -improve histopathological changes compared to Group II rats. In conclusion both vitamins may have myeloprotective effects against cyclophosphamide-induced myelosuppression.
As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreTo evaluate the toxicity of benzalkonium chloride in aquaculture, the hemato-serological indices of Nile tilapia Oreochromis niloticus are used as biomarkers. Following exposure to three concentrations of benzalkonium chloride BAC 0.1, 0.25, 0.50, and 1 mg/l (BAC1,2,3 and 4) in aquaria for two durations 21 and 42 days, the microbiological assay in fish aquaria, in addition to blood parameters were assessed. Except for the mean difference between BAC2 and BAC3 (P > 0.05) at 42 days, the mean values of the bacterial counts revealed a significant difference between all compared groups (0.05 ≥ P ≤ 0.01). Following exposure to the lower concentrations of BAC (1, 2 and 3), the main blood parameters of Oreochromis niloticus namely red bl
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreArcHydro is a model developed for building hydrologic information systems to synthesize geospatial and temporal water resources data that support hydrologic modeling and analysis. Raster-based digital elevation models (DEMs) play an important role in distributed hydrologic modeling supported by geographic information systems (GIS). Digital Elevation Model (DEM) data have been used to derive hydrological features, which serve as inputs to various models. Currently, elevation data are available from several major sources and at different spatial resolutions. Detailed delineation of drainage networks is the first step for many natural resource management studies. Compared with interpretation from aerial photographs or topographic maps, auto
... Show MoreToday the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The po
... Show MoreDr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.
In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very
... Show More