In this work an enzyme linked immunosorbent assay (ELISA) technique has been used for detection of some inflammatory markers in serum of acute coronary syndrome (ACS)-Patients Admitted to the cardiac care unit (CCU) of Iraqi Centre For Heart Diseases and Ibn AlNafees Teaching Hospital. The present method includes quantitative measurement of interleukine-6 (IL-6) and C-reactive protein (CRP), as their increase during symptoms may be responsible for identifying the mechanism of myocardial damag, in addition to their best performance than other quantitative tests perhaps due to their association with atherosclerotic process that belongs to the endothelial dysfunction. Aim of this study is to estimate the prevalence and correlation of IL-6 w
... Show MoreBackground: The aim of this study was to evaluate the shear bond strength (SBS) and adhesive remnant index (ARI) of different orthodontic adhesive systems after exposure to aging media (water storage and acid challenge). Materials and methods: Eighty human upper premolar teeth were extracted for orthodontic purposes and randomly divided into two groups (40 teeth each): the first group in which the bonded teeth were stored in distilled water for 30 days at 37°C, and the second group in which the bonded teeth were subjected to acid challenge. Each group was further subdivided into four subgroups (10 teeth each) according to the type of adhesive system that would be bonded to metal brackets: either non-fluoride releasing adhesive (NFRA),
... Show MoreThe study of the " Speech act " in grammatical codes reveals great efforts in the study of the elements of linguistic communication contained in their efforts, and is part of the study of the linguistics of heritage, and the research has been designed to identify the verbal act in the blog of Ibn al-Khabaz (guiding the shine) by studying its sections comprehensively; To the spirit of grammatical discourse as well as the combination of the concept of the semantic act already verbal according to Searle, and its response in the form of indirect verbal acts more than direct acts, as well as the pure formulas of the opinions of the violators in the speech of Ibn al-Khabaz other than the proven verbal formulas Approval and approval, the class
... Show MoreAmino and fatty acids in the liver tissue of Uromastyx aegyptius microlepis during the periods of hibernation (December) and activity (May) were estimate by a high performance liquid chromatography, liver of a lizard during the activity and hibernation seasons, contained 18 amino acids, which include, 10 essential amino acids and 8 non-essential amino acids, and the liver in the male lizard contained five fatty acids during each season, the concentration rates of all the amino acids during the activity season were higher than their counterparts during the hibernation season, the total concentrations of essential and non-essential amino acids during the activity season were 19434.8 µg/ml, which was greater than the total concentrations leve
... Show MoreThe Vogue of the Restoration Comedy of Manners and George Etherage's The Man of Mode; or, Sir Fopling Flutter
Bilastine (BL) is a novel non-sedating second-generation antihistamine, and its bioavailability is about 60%. Objective: To compare the bioavailability of prepared oral self-nanoemulsions of BL (BL-SNE) with that of pure BL and marketed tablets. Methods: Four groups of Wistar rats were used in this study, each with six rats weighing between 200 and 250 g. They were treated orally using a a gavage tube. The groups were fed either with conventional tablets ("Alerbix®") after being ground and dispersed with deionized water (DIW), treated with BL-SNE or fed with pure BL powder suspension. The fourth group did not receive any medication. The concentration of BL in the rat’s plasma was measured using HPLC. We used Trandolapril as an an interna
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show More