This study was designed to investigate the effect of thyroid hormone disturbance on lipids profiles and liver functions. Eighteen mature male rats Rattus norvegicus were divided into three groups. The first and the second groups were injected subcutaneously with thyroxine (T4) and carbimazol (both at 600 µg/kg BW) respectively on alternate days, to produce recurrent periods of hyper and hypothyroidism .The control group which is the third group was injected with physiological saline. The process continued 4 weeks, after that, injection, blood specimens were collected to estimate serum levels of T3 and T4, Total cholesterol (TC), Triglycerides (TG), High density lipoprotein cholesterol (HDL-C), Low density lipoprotein cholesterol (LDL-C) and Very low density lipoprotein cholesterol (VLDL-C) were determined in the serum. In addition to that, we measure GOT, GPT and CPK enzymes activity. The results showed no significant difference in body weight and a significant increase (P<0.01) in liver weight of Thyroxine injected group, while Carbimazol injected group showed significant increase (P<0.05) in body and in liver weight. There was a significant decrease in TC concentration and there was no significant decrease in TG, HDL-C, LDL-C and VLDL-C concentration in the serum of Thyroxine injected group, while the Carbimazol injected group showed significant increase in serum TC, LDL-C, TG, HDL-C and VLDL-C concentration. The results also pointed to a significant increase in GOT and GPT activity, and no significant decrease in CPK activity in the serum of thyroxine injected group, in addition to a significant increase in GPT activity and a significant increase in GOT activity without any significant differences in CPK activity noticed in the liver homogenate of the same group. The results also pointed to a significant increase in GOT and GPT activity, and significant increase in CPK activity in the serum of Carbimazol injected group, with significant decrease in GOT activity, significant decrease in GPT activity and significant increase in CPK activity in the liver homogenate of the same group. Results of the liver histological study showed changes in the liver histological structure in both groups. An increasing in T3 and T4 levels led to a little expansion in the sinusoids and this might be due to accumulation of glycoprotein, also there was a centrilobular hepatocytes necrosis and congestion with RBCs in the sinusoids of central area due to hypoxia especially in perivenular hepatocytes area. In addition to extravasations of RBCs between the hepatocytes which are severely atrophied and some are necrosed. It was noticed that there is a direct relationship between low levels of T4 and T3 and the hepatic dysfunction which led to sinusoids expansion, granular and hydropic degeneration due to hepatocytes immunological or toxically damaged which gave the hepatocytes edema appearance.
In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreTaxes are an essential axis in the economy as the most effective and effective economic tool in any country (economy). Expanding the scope of taxation without adequate study has produced a dangerous result with a negative impact that is almost apparent, namely (tax evasion), which stands as a barrier preventing the state from reaching Therefore, the research sought to study strategic tax planning and its importance in reducing tax evasion, and the research aims from that to prove the importance of adopting strategic planning in the field of taxes according to modern and effective scientific foundations to reduce tax evasion to enhance the achievement of tax evasion. The financing objective is in addition to the other objectives,
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
The dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on leather
... Show MoreThe dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreExperimental and numerical investigations of the centrifugal pump performance at non-cavitating and cavitating flow conditions were carried out in the present study. Experiments were performed by applying a vacuum to a closed-loop system to investigate the effects of the net positive suction head available (NPSHa), flow rate, water temperature and pump speed on the centrifugal pump performance. Accordingly, many of the important parameters concerning cavitation phenomenon were calculated. Also, the noise which is accompanied by cavitation was measured. Numerical analysis was implemented for two phase flow (the water and its vapor) using a 2-D simulation by ANSYS FLUENT software to investigate the internal flow of centrifugal pump under c
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More