The study included general survey of some districts of Iraq in order to determinate new distribution areas for 33 species of the genus salvia L. ,new collections obtained , new locations for many species recorded. Observed specimens in most Iraqi herbaria were studies and identified. ,the flowering period were also studied
The study included general survey of some districts of Iraq in order to determinate new distribution areas for 33 species of the genus salvia L. ,new collections obtained , new locations for many species recorded. Observed specimens in most Iraqi herbaria were studies and identified. ,the flowering period were also studied
This study includes design and synthesis of new non-steroidal anti-inflammatory agents (NSAIDs) with expected cyclooxygenase-2 (COX-2) selective inhibition to achieve better activity and low gastric side effects. Two series of compounds have been designed and synthesized as potential NSAIDs,these are: Salicylamide derivatives (compounds 3,4,5 ) and Diflunisal derivatives (compounds 10&11). In vivo acute anti-inflammatory effect of one of the synthesized agents (compound 3) was evaluated in the rat using egg-white induced paw edema model of inflammation. Preliminary pharmacological study revealed that compound 3 exhibited less anti-inflammatory effect compared to that of aspirin after
... Show MoreAcute lung injury (ALI) is a state of inflammation that breaks down the lung endothelial and epithelial cell barriers. In the current study, we investigated the role of resveratrol (RES) in regulating the expression and functions of tight junction proteins (TJP) in epithelial cell responses following exposure to this superantigen. To this end, C3H mice were given resveratrol orally twice prior to intranasal challenge with lethal SEB doses. 16S rRNA results showed that there were microbes transported in the blood in addition to the lung and colonic tissues. For this purpose, we used a reporter E. coli-GFP labeled bacterium to monitor and examine the viability of this bacterium in case
Despite extensive investigations, an effective treatment for sepsis remains elusive and a better understanding of the inflammatory response to infection is required to identify potential new targets for therapy. In this study we have used RNAi technology to show, for the first time, that the inducible lysophosphatidylcholine acyltransferase 2 (LPCAT2) plays a key role in macrophage inflammatory gene expression in response to stimulation with bacterial ligands. Using siRNA- or shRNA-mediated knockdown, we demonstrate that, in contrast to the constitutive LPCAT1, LPCAT2 is required for macrophage cytokine gene expression and release in response to TLR4 and TLR2 ligand stimulation but not for TLR-independent stimuli. In addition, cells transfe
... Show MoreBackground: Polymorphisms in the TNF-α gene affect the development and progression of rheumatoid arthritis. Objective: To investigate the associations between (-806 T/C) and (-857 T/C) SNPs with rheumatoid arthritis severity and susceptibility in a sample of Iraqi patients. Methods: A case-control study was conducted in Baghdad, Iraq. Twenty healthy controls and 63 patients confirmed to be newly diagnosed with rheumatoid arthritis were included. Those are divided into two groups (patients and controls), and the patients were further subdivided into severe and mild-moderate groups. Samples from those participants were analyzed for clinical and inflammatory parameter measurements. Genotyping by the Sanger method was performed to stu
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More