Preferred Language
Articles
/
nhfceo0BVTCNdQwCVhWg
The Ability of Resveratrol to Attenuate Ovalbumin-Mediated Allergic Asthma Is Associated With Changes in Microbiota Involving the Gut-Lung Axis, Enhanced Barrier Function and Decreased Inflammation in the Lungs
...Show More Authors

Asthma is a chronic respiratory disease highly prevalent worldwide. Recent studies have suggested a role for microbiome-associated gut–lung axis in asthma development. In the current study, we investigated if Resveratrol (RES), a plant-based polyphenol, can attenuate ovalbumin (OVA)-induced murine allergic asthma, and if so, the role of microbiome in the gut–lung axis in this process. We found that RES attenuated allergic asthma with significant improvements in pulmonary functions in OVA-exposed mice when tested using plethysmography for frequency (F), mean volume (MV), specific airway resistance (sRaw), and delay time(dT). RES treatment also suppressed inflammatory cytokines in the lungs. RES modulated lung microbiota and caused an abundance of Akkermansia muciniphila accompanied by a reduction of LPS biosynthesis in OVA-treated mice. Furthermore, RES also altered gut microbiota and induced enrichment of Bacteroides acidifaciens significantly in the colon accompanied by an increase in butyric acid concentration in the colonic contents from OVA-treated mice. Additionally, RES caused significant increases in tight junction proteins and decreased mucin (Muc5ac) in the pulmonary epithelium of OVA-treated mice. Our results demonstrated that RES may attenuate asthma by inducing beneficial microbiota in the gut-lung axis and through the promotion of normal barrier functions of the lung.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Principles of war and jihad to protect the environment and civilians in times of war in Islamic Sharia
...Show More Authors

Research summary

Islam protects the environment and civilians in peace and war, and in international humanitarian law protection of the environment and civilians in international conflicts only. As for wars and internal conflicts, it is not within the jurisdiction of international humanitarian law. In Islamic law, the principles of protecting the environment and civilians are fixed in all wars and conflicts, whether internal or external, local. or international.

Islam laid down moral principles in war, including:

- Preserving the environment and avoiding corruption in the land by burning trees and killing animals unnecessarily.

- Not to be exposed to non-combatants, including women, boys, the elderly, the disa

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
Principles of war and jihad to protect the environment and civilians in times of war in Islamic Sharia
...Show More Authors

The use of destructive weapons in wars without restrictions and controls, which eat green and dry land, pollute the environment and cause genocide, has become the problem of the times.

International conventions for the protection of the environment during armed conflicts are characterized by generality, ambiguity, and open to interpretation by the participating states in the agreement, and each state interprets these texts to serve its interests, but the Islamic Sharia stipulates the prohibition of the use of these comprehensive destructive weapons in an unambiguous manner, As stated in the Holy Quran:

                

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 02 2015
Journal Name
Journal Of College Of Education For Women
Politeness Theories in Synge's Riders to the Sea
...Show More Authors

This research tackles the play of Synge "Rider to the Sea" to find out whether the theories of Leech (1983) and Brown and Levinson (1987) can be applied or not to this study. The model of Leech (1983) consists of seven principles and for Brown and Levinson (1987),it consists of two principles of politeness where one of them is positive and the other is negative politeness. It is hypothesed that: 1. There is a relation between the two theories. 2. Synge deals with these theories in such a way to depict his characters. 3. It is also hypothesed that every character deals with these principles in such a way to show the events of the play. The study concludes that there is a relation between the two theories in depicting the characters then it s

... Show More
Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Politeness Theories in Synge's Riders to the Sea
...Show More Authors

This research tackles the play of Synge "Rider to the Sea" to find out whether the
theories of Leech (1983) and Brown and Levinson (1987) can be applied or not to this study.
The model of Leech (1983) consists of seven principles and for Brown and Levinson
(1987),it consists of two principles of politeness where one of them is positive and the other is
negative politeness.
It is hypothesed that:
1. There is a relation between the two theories.
2. Synge deals with these theories in such a way to depict his characters.
3. It is also hypothesed that every character deals with these principles in such a way to show
the events of the play.
The study concludes that there is a relation between the two theories in d

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 02 2017
Journal Name
Iraqi Journal Of Science
A Study Medicinal and Nutritional Effects of Thyme on Hematological Changes in Male Albino Rats
...Show More Authors

View Publication
Crossref
Publication Date
Wed Apr 08 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Bayes estimators for reliability and hazard function of Rayleigh-Logarithmic (RL) distribution with application
...Show More Authors

In this paper, we derived an estimators and parameters of Reliability and Hazard function of new mix distribution ( Rayleigh- Logarithmic) with two parameters and increasing failure rate using Bayes Method with Square Error Loss function and Jeffery and conditional probability random variable of observation. The main objective of this study is to find the efficiency of the derived of Bayesian estimator compared to the to the Maximum Likelihood of this function using Simulation technique by Monte Carlo method under different Rayleigh- Logarithmic parameter and sample sizes. The consequences have shown that Bayes estimator has been more efficient than the maximum likelihood estimator in all sample sizes with application

Publication Date
Sat Jun 04 2022
Journal Name
International Journal Of Language And Literary Studies
Investigating the Use of Google Meet and Face-to-Face in Teaching Conversation
...Show More Authors

conversation is an oral skill in which two persons can exchange their ideas, thoughts and opinions to communicate with each other. Learners can work in pairs or groups to practice dialogues chosen by the teacher from their textbook materials or from additional resources. Nowadays, because of Corona virus infection, our college students are taught all the subjects including conversation course either via google classroom platform or any other platforms. Google meet is one of online meetings between the teacher and students, i.e., a video meet in which students and the teacher join the online meetings in a specified time to communicate, express their ideas, thoughts and feelings about what is mentioned above. In this study, the resea

... Show More
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Islamic Sciences
The translated text is a second launch of the text (Al-Kharja Al-Muwashah Al- Andalusian as an example
...Show More Authors

Literary translation is one of the most difficult types of translation ,because it conveys feelings that differ from one person to another, and since the language constitutes an obstacle to understanding the Andalusian excerpts, the translators resorted to translating it, and this was a second start to the text, different from its first start, is said from the tongue of the Al-washah , The muwashshah is a poetic art that appeared in Andalusia after the Arabs entered it ,characterized by special system It differs from the traditional Arabic poem, as it has a beginning represented in the beginning of the muwashshah and several equal parts ending with differentrhymes.

... Show More
View Publication Preview PDF
Crossref