In this study, the modified size-strain plot (SSP) method was used to analyze the x-ray diffraction lines pattern of diffraction lines (1 0 1), (1 2 1), (2 0 2), (0 4 2), (2 4 2) for the calcium titanate(CaTiO3) nanoparticles, and to calculate lattice strain, crystallite size, stress, and energy density, using three models: uniform (USDM). With a lattice strain of (2.147201889), a stress of (0.267452615X10), and an energy density of (2.900651X10-3 KJ/m3), the crystallite was 32.29477611 nm in size, and to calculate lattice strain of Scherrer (4.1644598X10−3), and (1.509066023X10−6 KJ/m3), a stress of(6.403949183X10−4MPa) and (26.019894 nm).
In diabetes, impaired wound healing and other tissue abnormalities are considered major concerns. Many factorsaffect the time and quality of wound healing. One of the purposes of medical sciences is wound healing in a short time withreduced side effects. The herbal products are more precious in both prophylaxis as well as curative in delayed diabetic woundhealing activity when compared to synthetic drugs.A wide range of evidence has shown that capers plant possesses differentbiological effects, including antioxidant, anticancer and antibacterial effects. Phytochemical analysis shows thatC. spinosahashigh quantities of bioactive constituents, including polyphenolic compounds, which are responsible for its health-promotingeffects. The healing
... Show MoreAbstract
This research deals will the declared production planning operation in the general company of planting oils, which have great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm application on non-linear model which been more difficulty than possible solution when imposed restric
... Show MoreIn this study, NAC-capped CdTe/CdS/ZnS core/double shell QDs were synthesized in an aqueous medium to investigate their utility in distinguishing normal DNA from mutated DNA extracted from biological samples. Following the interaction between the synthesized QDs with DNA extracted from leukemia cases (represents damaged DNA) and that of healthy donors (represents undamaged DNA), differential fluorescent emission maxima and intensities were observed. It was found that damaged DNA from leukemic cells DNA-QDs conjugates at 585 nm while intact DNA (from healthy subjects) DNA–QDs conjugates at 574 nm. The obtained results from the optical analyses indicate that the prepared QDs could be utilized as probe for detecting disrupted DNA th
... Show MoreAbstract: E2F6 is a member of the E2F family of transcription factors involved in regulation of a wide variety of genes through both activation and repression. E2F6 has been reported as overexpressed in breast cancers but whether or not this is important for tumor development is unclear. We first checked E2F6 expression in tumor cDNAs and the protein level in a range of breast cancer cell lines. RNA interference-mediated depletion was then used to assess the importance of E2F6 expression in cell lines with regard to cell cycle profile using fluorescence-activated cell sorting and a cell survival assay using (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT). The overexpression of E2F6 was confirmed in breast tumor cDNA samp
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Objectives: To determine the effectiveness of the educational program on nursing staff knowledge about infection control measures at the Intensive Care Unit in Al-Diwaniya Teaching Hospital.
Methodology: A pre-experimental design (one group design: pre-test and post-test) was used. This study was conducted in Al-Diwaniya Teaching Hospital for the period from ( 20th February to 5th March, 2020) on a non-probability (purposive) sample consisting of (25 nurses) working in ICU. A questionnaire was built as a data collection tool and consisted of two parts:
First part: The demographic characteristics of the nursing staff (age, gender, level of education, years of experien
... Show MoreObjectives: This study aims to assess and compare the micro-shear bond strength (μSBS) of a novel resin-modified glass-ionomer luting cement functionalized with a methacrylate co-monomer containing a phosphoric acid group, 30 wt% 2-(methacryloxy) ethyl phosphate (2-MEP), with different substrates (dentin, enamel, zirconia, and base metal alloy). This assessment is conducted in comparison with conventional resin-modified glass ionomer cement and self-adhesive resin cement. Materials and methods: In this in vitro study, ninety-six specimens were prepared and categorized into four groups: enamel (A), dentin (B), zirconia (C), and base metal alloys (D). Enamel (E) and dentin (D) specimens were obtained from 30 human maxillary first premolars e
... Show MoreThe present study provides a new insight into valuable information on the diverse structure of the Anisakid population and discusses the limited species richness in the Nemipterus japonicus (Bloch,1791) (Perciformes, Nemiperidae). The fishing area consists of various locations in the Arabian Gulf (29°58 0 33 00 N48°28 0 20 E). A total of 315 marine fish were examined, (n=287) were infected. Larval stages (n= 763) encysted within the mesenteries peritoneum and viscera of fish organs were isolated, with a prevalence of 91.11% of infection and, the intensity was 2.65. Molecular analysis was carried out on thirty individuals who have examined the morphology and showed some appearance differences, by amplifying internal transcribed spacers
... Show More