Preferred Language
Articles
/
bijps-1063
Effects of Vitamin D3 on Methotrexate- Induced Jejunum Damage in Rats
...Show More Authors

Both methotrexate and vitamin D3 are used in combination for the treatment of various diseases. The aim of this study is to highlight the effect of vitamin D3 on methotrexate-induced jejunum damage using biochemical and   histopathological  studies. Seven groups of both sexes of rats were selected and treated as follows: (Group I and Group II) : control 1,control 2 (I.P normal saline) daily for 14 and 21 days respectively ; (Group III and Group IV) :vitamin D3 groups (500 IU/rat/day) orally for 14 and 21 days, respectively;(Group V): once daily dose of methotrexate 20mg/kg, I.P injected for 4 days;(Group VI):vitamin D3 (500 IU/rat/day) once daily for 14 days and methotrexate (20 mg/kg I.P) injected only at day 10;.(Group VII) vitamin D3 (500 IU/rat/day) orally for 21 days and methotrexate (20 mg/kg I.P) injected only at day 17; then the jejunum was removed and used for measuring malondialdehyde (MDA) content, total antioxidant capacity (TAOC) level; in addition histopathological study of jejunum tissue. Administration of vitamin D3 for 21 days and a single dose of methotrexate at day 17 resulted in non-significant difference (P>0.05) in MDA; while significant reduction (P<0.05) in the TAOC level in jejunum tissue; furthermore , sever villi damage ,crypts abscess, epithelial atrophy , mixed inflammatory cells infiltrate and goblet cells depletion were observed in comparison with methotrexate group. So the study demonstrates that vitamin D3 plays a synergistic role with methotrexate therefore the combined use of vitamin D3 and methotrexate may be used as a strategy to overcome dose limitations and side effects when use for the treatment of cancer, rheumatoid arthritis and psoriasis.

Key words: Jejunum damage, Methotrexate, Oxidative stress, Rats, Vitamin D3.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Generalized Left Derivations with Identities on Near-Rings
...Show More Authors

In this paper, new concepts which are called: left derivations and generalized left derivations in nearrings have been defined. Furthermore, the commutativity of the 3-prime near-ring which involves some
algebraic identities on generalized left derivation has been studied.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control &amp; Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Tue Nov 19 2024
Journal Name
Baghdad Science Journal
On En- Prime Compactly Packed Acts over Monoid
...Show More Authors

في هذا العمل تم دراسة المقاسات الاولية من النمطEn المرصوصة المكتضة ودراسة  تعيم هذا المفهوم الى مفهوم الآثار الاولية من النمط En المرصوصة المكتضة حيث تم دراسة بعض العلاقات والتشخيصات الخاصة بهذه المفاهيم حيت تم برهنت العلاقات الخاصة بمفهوم المقاسات الاولية من النمط En المرصوصة المكتضة ليكن ₩ مقاس و كل مقاس جزئي  هو اولي من النمط  En  فان المقاس ₩ هو مقاس اولي من النمط En مرصوص مكتض اذا و فقظ اذا كل مقاس جزئي د

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Misan Journal Of Academic Studies
A review on various methods for dehazing images
...Show More Authors

In this paper, a literature survey was introduced to study of enhancing the hazy images , because most of the images captured in outdoor images have low contrast, color distortion, and limited visual because the weather conditions such as haze and that leads to decrease the quality of images capture. This study is of great importance in many applications such as surveillance, detection, remote sensing, aerial image, recognition, radar, etc. The published researches on haze removal are divided into several divisions, some of which depend on enhancement the image, some of which depend on the physical model of deformation, and some of them depend on the number of images used and are divided into single-image and multiple images dehazing model

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (20)
Crossref (19)
Scopus Crossref
Publication Date
Tue Dec 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Comparison between Electroplating and Electroless on Plastic Surface
...Show More Authors

 

We report a method of converting non-conductive plastic surfaces into conductive by plating either copper electroless or copper electroplating -carbon black containing bending Agent onto Perspex plastics . Various approaches have been studied in order to comparing properties of the plated copper for two methods such as scanning electron microscopy (SEM),thickness, roughness, porosity, tensile Strength and elongation. The results show that the surface of electroplating was uniform, compact, and continuous and it had an obvious metallic sheen, while the surface of plated copper for electroless for it had many pores. Also observed that the coating was composed of small cells. Thes

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
PART 2 An Experiment on the Box plot
...Show More Authors

Abstract

These experiments seek to investigate the effects of the fixed variations to the basic box plot on subjects' judgments of the box lengths. The study consists of two experiments, were constructed as an extension to the experiments carried out previously by Hussin, M.M. (1989, 2006).  Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box length and also varying with respect to other elements such as, box width or whisker length. When he (1989) suggested in the future research points (1, 2), the changing length of the st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Free Head Shear Test on Decomposed Granite Soil
...Show More Authors

The study presents the test results of Completely Decomposed Granite (CDG) soil tested under drained triaxial compression, direct shear and simple shear tests. Special attention was focused on the modification of the upper halve of conventional Direct Shear Test (DST) to behave as free
head in movement along with vertical strain control during shear stage by using Geotechnical Digital System (GDS). The results show that Free Direct Shear Test (FDST) has clear effect on the measured shear stress and vertical strain during the test. It has been found that shear strength
parameters measured from FDST were closer to those measured from simple shear and drained triaxial compression test. This study also provides an independent check on

... Show More
View Publication Preview PDF
Crossref