Preferred Language
Articles
/
bijps-888
Effects of Hydrochlorothiazide on Tenofovir Disoproxil Fumarate-Induced Nephrotoxicity in Rats
...Show More Authors

Tenofovir disoproxil fumarate, a nucleotide reverse transcriptase inhibitor utilized for the treatment of hepatitis B virus and human immunodeficiency virus infections; and is now one of the most widely used antiretroviral drug. However, tenofovir disoproxil fumarate can induce nephrotoxicity, which may be attributed to the interaction between such drug and the organic anion transporters (hOAT1, and OAT3) with consequent changes in levels of some parameters that may have a role in nephrotoxicity. Thiazide diuretics have high to intermediate potency of inhibition of OAT1s and OAT3; thus, it may possess nephroprotective effects. This study was designed to investigate whether hydrochlorthiazide has nephroprotective effects on tenofovir disoproxil fumarate-induced nephrotoxicity in rats.

Twenty eight healthy adult male albino rats weighing 180-200g were utilized in this study for duration of 5weeks (35 days) treatment. Rats were randomly divided into four groups (7animals each). Group I: Negative control (orally given distilled water) by gavage tube; Group II: Rats orally received 600 mg/kg/day tenofovir disoproxil fumarate by gavage tube; Group III: Rats orally administered hydrochlorothiazide alone at a dose (10 mg/kg/day) by gavage tube, and Group IV: Rats orally administered hydrochlorothiazide at a dose (10 mg/kg/day) plus tenofovir disoproxil fumarate 600 mg/kg/day by gavage tube. On day 36 of the study, after euthanization of each animal by diethyl ether, 3-5ml of blood samples were collected from each rat by an intra-cardiac puncture, then centrifuged at 3000 rpm for 15 minutes to obtain serum, which was then transferred into suitable plain tubes and preserved at -20 °C; and it was utilized for the estimation of cystatin C and IL-10 level.

Rats administered tenofovir disoproxil fumarate for 5 weeks (group II) produced a significant -elevation (P<0.05) in serum cystatin C level and –reduction in serum IL-10 levels compared to negative control group (group I); similarly,  administration of hydrochlorothiazide alone to rats (group III) produced a significant -elevation (P<0.05) in serum cystatin C level and –reduction in serum IL-10 levels compared to negative control group (group I); also, rats administered combination of hydrochlorothiazide plus tenofovir disoproxil fumarate to rats for 5 weeks (group IV) produced significant elevation (P<0.05) in serum level of cystatin C, and a significant reduction (P<0.05) in IL-10 serum level in treated rats compared to the corresponding levels of negative control animals (group I); beside that in (group IV) rats there were significant reduction (P<0.05) in serum level of both cystatin C, and IL-10 in treated rats compared to the corresponding levels compared to TDF-treated (group II). In conclusion, treatment with hydrochlorthiazide plus tenofovir disoproxil fumarate in an attempt to prevent nephrotoxicity induced by tenofovir disoproxil fumarate is not attained.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
An Application Domain Based on General Object Oriented Software Models
...Show More Authors

Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2011
Journal Name
Engineering And Technology Journal
Off-Line Arabic Signature Recognition Based on Invariant Moments Properties
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
N3, N749 dyes effect on the TiO2 for optoelectronic applications
...Show More Authors

The present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu

... Show More
View Publication
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
work alienation and its impact on Job Satisfaction Applied Research
...Show More Authors

The research aims to determine the role of functional alienation and its impact on Job Satisfaction in General Motors Company, that were selected to apply the field side being an important company in Iraq, the problem was research with difficulty in employees adapt and their sense of alienation in their work which is reflected negatively on the level of satisfaction with work in company searched. A questionnaire was adopted as the main tool for data collection research which included (31) items distributed on (50) employees in the company selected, on a randomly chosen and based on the statistical program ready by (SPSS). Sample of this study was the most important findings of the research are the weak management of the company i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Notes On The Non Linear Operator Equation I AXAX n
...Show More Authors

Necessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.

Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF