The present work involved a study the effect of cobalt(II) complex with formula [CoL(H2O)NO3] .4ETOH where L=Nitro [5-(P-nitro phenyl) -4-phenyl-1,2,4 traizole-3-dithiocarbamato hydrazide] aqua. (4) Ethanol and anti-cancer drug - cyclophosphamide on specific activity of two liver enzymes (GPT,ALP) by utilizing an in vivo system in female mice. On the enzymatic level an inhibition in the activity of GPT was noticed in different body organs such as liver, kidney and lung. The inhibition was noticed in both test and cyclophosphamide drug (cp). Mice were treated with three doses of cyclophosphamide (90,180, 250) ?g/ mouse for three days. The same doses were used for the cobalt (II) complex. The liver shows the highest rate of(GPT) inhibition compared to other organs. The ratio was about 90% at three doses of cobalt (II) complex, this ratio was similar to ratio inhibition of cyclophosphamide at the same doses. On the contrary the enzyme ALP showed high activation in different organs such as liver, kidney and lung in both groups, test and cyclophosphamide drug (cp) at the three doses (90, 180, 250) ?g /mouse. The result showed the highest ratio of activation in the kidney comparable with other organs. The maximum activation of cobalt(II) complex was about 1198% at a concentration 180µg/mouse.There are significant differences(P<0.05) for two treatment when the concentration was increased.
Many designs have been suggested for unipolar magnetic lenses based on changing the width of the inner bore and fixing the other geometrical parameters of the lens to improve the performance of unipolar magnetic lenses. The investigation of a study of each design included the calculation of its axial magnetic field the magnetization of the lens in addition to the magnetic flux density using the Finite Element Method (FEM) the Magnetic Electron Lenses Operation (MELOP) program version 1 at three different values of current density (6,4,2 A/mm2). As a result, the clearest values and behaviors were obtained at current density (2 A/mm2). it was found that the best magnetizing properties, the high
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe aim of this research is to know danger of radioactive isotopes
that are found in samples of drugs traded in Iraqi markets. The
samples are Iraqi Amoxicillin, English Amoxicillin, UAE
Amoxicillin, Indian Amoxicillin, Iraqi Paracetamol, English
Paracetamol, UAE Paracetamol and Indian Paracetamol. By high
purity germanium the activity of the following isotopes 40K, 214Pb,
228Ac and 137Cs is measured and the specific activity was used to
calculate the annual effective dose. Then the calculated annual
effective dose values are compared with the allowable annual
effective dose values of each part of digestive channel. This research
concluded that the measured annual effective dose values are not
dangerous.<
A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization
... Show MoreObjectives: The purpose of this in vitro study was to compare the effect of adding a poloxamer surfactant to the irrigant solutions on its cleaning efficiency. Design: In this study the roots of extracted permanent premolar teeth were used and evaluated by using Scanning Electronic Microscopy (SEM). Materials and Method: 72 human single tooth of permanent premolar (8 for each group) were used in this in vitro study. Roots after sectioning at cervical area to get 15 mm were embedded in a plastic container filled with impression silicon, then instrumented with ProTaper rotary instruments till size F4. Each group (8 root) were irrigated with one of the nine solutions used in study: three concentrations of NaOH [5% (A1), 2.5%(A2), 0.5%(A3)], th
... Show MoreIn the present research, the electrical properties which included the ac-conductivity (σac), loss tangent of dielectric (tan δ) and real dielectric constant (ε’) are studied for nano polycarbonate in different pressures and frequencies as a function of temperature these properties were studied at selective temperature gradients which are (RT-50-100-150-250)°C. The results of the study showed that the values of dielectric constant and dissipation factor increase with increasing pressure and temperature and decreases by increasing frequency. And the results of electrical conductivity showed that it increases with increasing temperature, pressure and frequency.
Derivational word formation process is one of the most substantial linguistic procedures that solves many problems in the translation of the language new vocabulary and helps to comprehend the smallest language component that not simply semantically and structurally explain the elements of both Russian and Arabic but also enables translators to comprehend the derivational method procedures of both languages. It also reveals the structural aspects of translation equivalences, cognitive and semantic foundations of translation. The rapid development of languages and the appearance of a new vocabulary like ṭabaʿa "print → ṭābiʿat "printer", kataba "to write" → kātib → kātibat, rafaʿa "to raise" → rāfiʿat "a crane" d
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More