Organophosphorus insecticide and growth regulator namely Ethephon (2-chloroethylphosphonic acid) are widely used as a ripening process accelerator and a cultivation duration inhibitor. Pomegranate extract (PPE) has recently been taken into consideration due to its pharmacological effects especially those associated with renal diseases. Thus, this study aims to investigate the possible protective effect of PPE against ethephon-induced nephrotoxicity in rats. In this study four groups of adult male rats were divided into control group, PPE 400 mg/kg group, Ethephon 250 mg/kg group, and finally, PPE + Ethephon group (treated with the same dose of PPE group and Ethephon group). In the current study, kidney function parameters (KIM-1, creatinine, and urea) along with oxidative stress markers, heme oxygenase-1 (HO-1) and nuclear factor erythroid 2–related factor 2 (Nrf2), glutathione (GSH) and its correlated enzymes, nitric oxide (NO), superoxide dismutase (SOD), malondialdehyde (MDA) and catalase (CAT) were estimated. Additionally, mediators of renal inflammation: interleukin 1 beta (IL-1β), tumor necrosis factor-alpha (TNF-α), nuclear factor kappa B (NF-κB) were measured. Apoptotic biomarkers (Bax, caspase 3, and Bcl2) in addition to renal histopathological data were also investigated. Results revealed that Ethephon elicited a significant increase in oxidation markers and reduced antioxidant levels, accompanied by oxidative renal tissue injury. Consequently, administration of Ethephon was reported to provoke secretion of the pro-inflammatory mediators. Moreover, histopathological results showed that deformities in the renal tissues were noticed which is attributed to Ethephon exposure. Interestingly, co-administration of PPE and Ethephon resulted in significantly ameliorated the biochemical and histopathological alterations produced by Ethephon. Current results propose the potential effect of PPE in the protection of renal tissue from Ethephon induced nephrotoxicity in rats.
Registration techniques are still considered challenging tasks to remote sensing users, especially after enormous increase in the volume of remotely sensed data being acquired by an ever-growing number of earth observation sensors. This surge in use mandates the development of accurate and robust registration procedures that can handle these data with varying geometric and radiometric properties. This paper aims to develop the traditional registration scenarios to reduce discrepancies between registered datasets in two dimensions (2D) space for remote sensing images. This is achieved by designing a computer program written in Visual Basic language following two main stages: The first stage is a traditional registration process by de
... Show MoreThis study aimed to investigate the influence of longitudinal steel embedded tubes located at the center of the column cross-section on the behavior of reinforced concrete (RC) columns. The experimental program consisted of 8 testing pin-ended square sectional columns of 150×150 mm, having a total height of 1400 mm, subjected to eccentric load. The considered variables were the steel square tube sizes of 25, 51 and 68 mm side dimensions and the load eccentricity (50 and 150) mm. RC columns were concealed steel tubes with hollow ratios of 3%, 12% and 20% depending on tube sizes used. The experimental results indicated an improvement in the overall behavior of eccentric columns when steel embedded tubes are used. The maximum gain in
... Show MoreA multidimensional systolic arrays realization of LMS algorithm by a method of mapping regular algorithm onto processor array, are designed. They are based on appropriately selected 1-D systolic array filter that depends on the inner product sum systolic implementation. Various arrays may be derived that exhibit a regular arrangement of the cells (processors) and local interconnection pattern, which are important for VLSI implementation. It reduces latency time and increases the throughput rate in comparison to classical 1-D systolic arrays. The 3-D multilayered array consists of 2-D layers, which are connected with each other only by edges. Such arrays for LMS-based adaptive (FIR) filter may be opposed the fundamental requirements of fa
... Show MoreAbstract
Objective(s): To evaluate the nurses` practices for children who diagnosed with febrile convulsion.
Methodology: A quantitative research, descriptive correlational design was used in this study, the study conducted on nurses who work in Al-Diwaniya Pediatrics Teaching Hospital-Iraq for Maternal and Children period from 12th September 2021 to 10th October 2022. A non- probability (convenience) sample has been applied to obtain the study goals. The study sample was (21) nurses who participate in the study. The study tool is composed of two parts: The first part is concerned with collection of nurses socio-demographic data obta
... Show MoreL1 adaptive controller has proven to provide fast adaptation with guaranteed transients in a large variety of systems. It is commonly used for controlling systems with uncertain time-varying unknown parameters. The effectiveness of L1 adaptive controller for position control of single axis has been examined and compared with Model Reference Adaptive Controller (MRAC). The Linear servo motor is one of the main constituting elements of the x-y table which is mostly used in automation application. It is characterized by time-varying friction and disturbance.
The tracking and steady state performances of both controllers have been assessed fo
... Show MoreIn this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show MoreThis work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera
... Show MoreOne of the diseases on a global scale that causes the main reasons of death is lung cancer. It is considered one of the most lethal diseases in life. Early detection and diagnosis are essential for lung cancer and will provide effective therapy and achieve better outcomes for patients; in recent years, algorithms of Deep Learning have demonstrated crucial promise for their use in medical imaging analysis, especially in lung cancer identification. This paper includes a comparison between a number of different Deep Learning techniques-based models using Computed Tomograph image datasets with traditional Convolution Neural Networks and SequeezeNet models using X-ray data for the automated diagnosis of lung cancer. Although the simple details p
... Show MoreBiometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in
... Show More