Oxidative stress is oxidative damage caused by free radicals and reactive oxygen species (ROS). These ROS can cause oxidative damage to cellular components, including membrane lipids, receptors, enzymes, proteins, and nucleic acids. It would eventually lead to cell apoptosis and the appearance of certain pathological conditions. This work investigates the antioxidant potentials of chamomile extract in vitro by evaluating the extract activity to scavenge 2,2-Diphenyl-1-picrylhydrazyl (DPPH), also in vivo by investigating its effects on oxidative stress-induced rats by assessing the total oxidant status (TOS) and total antioxidant capacity in the radiation exposed rats with and without the treatment with chamomile extract. The results have shown that chamomile extract contains materials with antioxidant properties. The in vitro analyses have indicated activity to detoxify the DPPH radicals almost as powerful as pure ascorbic acid. Furthermore, rats exposed to electromagnetic radiation have shown a disturbance in the balance of oxidants and antioxidants, in which the levels of TOS were elevated while the levels of TAC were reduced. Chamomile extract has been shown to exhibit a powerful function as an antioxidant in vivo. It has enhanced the antioxidant capacity of rats, reduced their total oxidant status, and protected exposure to radiation.
Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreEco-friendly concrete is produced using the waste of many industries. It reduces the fears concerning energy utilization, raw materials, and mass-produced cost of common concrete. Several stress-strain models documented in the literature can be utilized to estimate the ultimate strength of concrete components reinforced with fibers. Unfortunately, there is a lack of data on how non-metallic fibers, such as polypropylene (PP), affect the properties of concrete, especially eco-friendly concrete. This study presents a novel approach to modeling the stress-strain behavior of eco-friendly polypropylene fiber-reinforced concrete (PFRC) using meta-heuristic particle swarm optimization (PSO) employing 26 PFRC various mixtures. The cement was partia
... Show MoreDeep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.
Abstract Objective: The underlying molecular basis of ischemic heart diseases (IHDs) has not yet been studied among Iraqi people. This study determined the frequency and types of some cardiovascular genetic risk factors among Iraqi patients with IHDs. Methods: This is a cross-sectional study recruiting 56 patients with acute IHD during a 2-month period excluding patients >50 years and patients with documented hyperlipidemia. Their ages ranged between 18 and 50 years; males were 54 and females were only 2. Peripheral blood samples were aspirated from all patients for troponin I and DNA testing. Molecular analysis to detect 12 common cardiovascular genetic risk factors using CVD StripAssay® (ViennaLab Diagnostics GmbH, Austria) was performed
... Show MoreThis study thoroughly investigates the potential of niobium oxide (Nb2O5) thin films as UV-A photodetectors. The films were precisely fabricated using dc reactive magnetron sputtering on Si(100) and quartz substrates, maintaining a consistent power output of 50W while varying substrate temperatures. The dominant presence of hexagonal crystal structure Nb2O5 in the films was confirmed. An increased particle diameter at 150°C substrate temperature and a reduced Nb content at higher substrate temperatures were revealed. A distinct band gap with high UV sensitivity at 350 nm was determined. Remarkably, films sputtered using 50W displayed the highest photosensitivity at 514.89%. These outstanding optoelectronic properties highlight Nb2O5 thin f
... Show MoreThis paper presents the first data for bremsstrahlung buildup factor (BBUF) produced by the complete absorption of Y-91 beta particles in different materials via the Monte Carlo simulation method. The bremsstrahlung buildup factors were computed for different thicknesses of water, concrete, aluminum, tin and lead. A single relation between the bremsstrahlung buildup factor BBUF with both the atomic number Z and thickness X of the shielding material has been suggested.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More