The effects of KEM CON ONG and KEM TRI BONG creams on doxorubicin-induced skin ulcer in rats

نویسندگان

چکیده

The present study evaluated the effects of topical administration KEM CON ONG and TRI BONG creams on doxorubicin-induced skin ulcer, their systemic toxicity in ulcerated rats. lesions were induced by a single intradermal injection 0.2ml doxorubicin 1 mg/0.5ml dorsal region. areas covered topically with dimethyl sulfoxide, ONG, or twice day for 28 days. results indicated that significantly reduced ulcer size, increased hydroxyproline content animals’ tissues, improved histopathological structure tissues. No significant difference healing effect was observed between BONG-treated Besides, our demonstrated caused no change general status, hematological parameters, renal hepatic functions. Additionally, they did not alter histology liver kidney animals. In conclusion, application exerted cause rat model.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

the effect of aqueous extract of garlic on formalin-induced pain in male rats

چکیده اثر عصاره آبی سیر بر درد ناشی از آزمون فرمالین در موش صحرایی نر به کوشش نرگس اسکندری روزبهانی زمینه و هدف: گیاه سیر از خانواده لیلیاسه و گونهallium sativum بومی آسیای میانه بوده و از دوران ،باستان تاکنون به خواص درمانی متفاوت آن مثل: کاهندگی قندخون، کلسترول خون، فشار خون، اثرات مفیدآن بر دستگاه قلبی عروقی و بیماریهای انعقادی خون، اثرات آنتی اکسیداتیو، درمان بیماریهای تنفسی وگوارشی، ا...

15 صفحه اول

ECIES-KEM vs. PSEC-KEM

The purpose of this paper is to discuss the similarities and differences between the PSEC-KEM and ECIES-KEM. The schemes are in very similar in some ways: both base their security on the Diffie-Hellman key-agreement protocol and both make heavy use of the random oracle model. However there are a few very important differences: PSEC-KEM is an authenticated KEM whilst ECIES-KEM is unauthenticated...

متن کامل

Sk-kem : an Identity-based Kem

1.1. Design Rationale. In this document we will describe an identity-based encryption scheme based on the work of Sakai and Kasahara [19], and which we call SK-KEM. The scheme operates on any elliptic curve group which has an efficiently computable bilinear pairing and does not require the use of super-singular curves. The resulting scheme is the most efficient and flexible provably-secure sche...

متن کامل

KEM Combiners

Key-encapsulation mechanisms (KEMs) are a common stepping stone for constructing public-key encryption. Secure KEMs can be built from diverse assumptions, including ones related to integer factorization, discrete logarithms, error correcting codes, or lattices. In light of the recent NIST call for post-quantum secure PKE, the zoo of KEMs that are believed to be secure continues to grow. Yet, on...

متن کامل

Simple SK - ID - KEM

In 2001, Boneh and Franklin presented the first efficient and security-proved identity-based encryption scheme using pairing on elliptic curve. In 2003 Sakai and Kasahara proposed another IBE scheme with pairing, which has the potential to improve performance. Later, Chen and Cheng proved the security of a variant of Sakai and Kasahara’s scheme. While, both the security-provable schemes employ ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: T?p chí Nghiên c?u Y h?c

سال: 2023

ISSN: ['2354-080X']

DOI: https://doi.org/10.52852/tcncyh.v166i5e12.1523