Oxidative stress is oxidative damage caused by free radicals and reactive oxygen species (ROS). These ROS can cause oxidative damage to cellular components, including membrane lipids, receptors, enzymes, proteins, and nucleic acids. It would eventually lead to cell apoptosis and the appearance of certain pathological conditions. This work investigates the antioxidant potentials of chamomile extract in vitro by evaluating the extract activity to scavenge 2,2-Diphenyl-1-picrylhydrazyl (DPPH), also in vivo by investigating its effects on oxidative stress-induced rats by assessing the total oxidant status (TOS) and total antioxidant capacity in the radiation exposed rats with and without the treatment with chamomile extract. The results
... Show MoreThis aims tackles the importance of the organizational energy of the hotel organizations that search the success in the business field to penetrate in the whole tourist markets, and to draw the policies and firm rules which must be framed with the administrative strategies that contributed in creativity and achievement the targets besides provide a future vision due to its position among the competitive henceforth achieving the activity. This is what the chapters tackle in the theoretical side. Also many general questions have been arisen to determinate the importance of the research and many other special questions that express the problem of the study. To limit the levels of study alter
... Show MoreThe problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea
... Show MoreThe political struggle being waged by Muslims today is one of the most important issues that have preoccupied the Arab and international media, and the failures that have afflicted Muslims in our contemporary world have negatively affected the younger generations and led them, and with the influence of anti-Islam media, to rely on accusing Islam as a religion with all the negative in Islamic and Arab society . So secularism took its role in spreading these concepts by deviating from its course from the concept of science to the concept of (the religion).
From here the calls for reform rose to return the Muslims to the incubator of Islam, so people turned around them, but they turned into competing Islamic polit
The purpose of the theme of redesign of jobs one of the topics the task that offers the possibility for individuals to perform several tasks in the organization of health at the same time gain experience and diverse skills and achieve compatibility between the requirements of the most appropriate function and organization of the hand ,hence, the idea of studying the redesign of jobs of the division of blood transfusion services in the department of health Baghdad Rusafa to change the conventional methods used in the performance of functions ,which are no longer able to meet the needs of patients where blood transfusion is a key ingredient in health care and equal access to safe blood is needed
... Show MoreThe electoral mechanism is remarkably clear, a political tool for institutional construction, directing political life, forming the political scene, and forming the partisan scene. This process was through the design of electoral laws, as elections in Tunisian political history represented the indicator of its slow and accelerated transformations, so The elections in Tunisia usually coincide with important political stages, accompanied by legislative or constitutional amendments in general, Islamic or secular forces have played a fundamental role in promoting the democratic experience and the principle of the peaceful transfer of power. This led to the formation of a national consensus that would help the country not enter into political
... Show MoreIn this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIn this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err
... Show More