This study was designed to investigate the effect of thyroid hormone disturbance on lipids profiles and liver functions. Eighteen mature male rats Rattus norvegicus were divided into three groups. The first and the second groups were injected subcutaneously with thyroxine (T4) and carbimazol (both at 600 µg/kg BW) respectively on alternate days, to produce recurrent periods of hyper and hypothyroidism .The control group which is the third group was injected with physiological saline. The process continued 4 weeks, after that, injection, blood specimens were collected to estimate serum levels of T3 and T4, Total cholesterol (TC), Triglycerides (TG), High density lipoprotein cholesterol (HDL-C), Low density lipoprotein cholesterol (LDL-C) and Very low density lipoprotein cholesterol (VLDL-C) were determined in the serum. In addition to that, we measure GOT, GPT and CPK enzymes activity. The results showed no significant difference in body weight and a significant increase (P<0.01) in liver weight of Thyroxine injected group, while Carbimazol injected group showed significant increase (P<0.05) in body and in liver weight. There was a significant decrease in TC concentration and there was no significant decrease in TG, HDL-C, LDL-C and VLDL-C concentration in the serum of Thyroxine injected group, while the Carbimazol injected group showed significant increase in serum TC, LDL-C, TG, HDL-C and VLDL-C concentration. The results also pointed to a significant increase in GOT and GPT activity, and no significant decrease in CPK activity in the serum of thyroxine injected group, in addition to a significant increase in GPT activity and a significant increase in GOT activity without any significant differences in CPK activity noticed in the liver homogenate of the same group. The results also pointed to a significant increase in GOT and GPT activity, and significant increase in CPK activity in the serum of Carbimazol injected group, with significant decrease in GOT activity, significant decrease in GPT activity and significant increase in CPK activity in the liver homogenate of the same group. Results of the liver histological study showed changes in the liver histological structure in both groups. An increasing in T3 and T4 levels led to a little expansion in the sinusoids and this might be due to accumulation of glycoprotein, also there was a centrilobular hepatocytes necrosis and congestion with RBCs in the sinusoids of central area due to hypoxia especially in perivenular hepatocytes area. In addition to extravasations of RBCs between the hepatocytes which are severely atrophied and some are necrosed. It was noticed that there is a direct relationship between low levels of T4 and T3 and the hepatic dysfunction which led to sinusoids expansion, granular and hydropic degeneration due to hepatocytes immunological or toxically damaged which gave the hepatocytes edema appearance.
This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreThe research aims to determine the role of functional alienation and its impact on Job Satisfaction in General Motors Company, that were selected to apply the field side being an important company in Iraq, the problem was research with difficulty in employees adapt and their sense of alienation in their work which is reflected negatively on the level of satisfaction with work in company searched. A questionnaire was adopted as the main tool for data collection research which included (31) items distributed on (50) employees in the company selected, on a randomly chosen and based on the statistical program ready by (SPSS). Sample of this study was the most important findings of the research are the weak management of the company i
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreGlobal warming has had considerable effects on vital ecosystems, which has also been caused by increased temperatures and CO2 that follow changes in different abiotic factors, which poses threats to mangrove forests environment. This research was conducted to examine the physiological and morphological characteristics of the Rhizophora apiculata mangrove regarding higher air temperature for the variety of tree species that respond to climate change. Seedlings were cultivated for three months in regulated growth chambers with three varying temperatures of 38°C, 21°C under CO2 at 450 ppm, and ambient CO2 concentration i.e., 450 ± 20 ppm under average temperature at 28°C as the control condition
... Show More