The article examines metaphors as one of the fundamental means used by D. Rubina when writing the novel “Parsley Syndrome” to form images of dolls as equal heroes of the work. The author of the article continues research related to the work of Dina Ilinichna Rubina, a representative of modern Russian prose.
The aim of the study was extraction of arial part of Euphorbia cyathophora constituents with methanol and evaluate its effect on mitotic index and total chromosomal aberration bone marrow cell and spleen cell in mice 200 gm of E. cyathophora fine powder was defatted then extracted by cold maceration 80% ethanol for seven days. The extract was filtered and dried in a rotary evaporator then the dried extract was suspended with water and consecutively extracted using chloroform, ethyl acetate for each. The aqueous layer was then mixed with 100ml methanol. These fractions are dried under reduced pressure to obtain the dry extract. Twenty-four Albino mice were used for the experiment. The animals were divided into four groups: Gr
... Show MoreCervical carcinoma represent the second predominant cancer in female and there is a strong correlation between cervical cancer and the infection with high-risk types of HPV and expression the viral oncogenes. EMT is viewed as a vital advance in carcinoma development and ensuing metastasis. To evaluate correlation between the expression of Twist and HPV16 infection in a group of Iraqi patients with cervical carcinoma. A total of forty paraffin blocks included in this study which were divided into 30 sample of cervical cancer infected with HPV16and 10 sample of normal cervical tissues. The samples were subjected to immunohistochemical technique using Anti-Twist2 polyclonal antibody. The obtained data from this study indicate that majority of
... Show MoreEmpirical and statistical methodologies have been established to acquire accurate permeability identification and reservoir characterization, based on the rock type and reservoir performance. The identification of rock facies is usually done by either using core analysis to visually interpret lithofacies or indirectly based on well-log data. The use of well-log data for traditional facies prediction is characterized by uncertainties and can be time-consuming, particularly when working with large datasets. Thus, Machine Learning can be used to predict patterns more efficiently when applied to large data. Taking into account the electrofacies distribution, this work was conducted to predict permeability for the four wells, FH1, FH2, F
... Show MoreCheckpoint inhibitors are a type of immune therapy used to treat different types of cancers. These drugs block different checkpoint proteins, for example, CTLA-4, PD-1, and PD-L1 inhibitors.
They block proteins that stop the immune system from attacking the cancer cells. Checkpoints are also described as a type of monoclonal antibody that antagonizes binding between B7 to CTLA-4 and PD-L1 to PD-1.
Immune checkpoint inhibitors are used to treat BARCA mutated triple-negative breast cancer (TNBCS) in patients who do not respond to chemotherapy, and also in the treatment of highly mutated and solid tumors such as brain tumors, liver, and pancreatic cancers.
Immune checkpoint inhibitors exhibit an effect on solid tumo
... Show MoreThe research aims to identify the theoretical foundations for measuring and analyzing quality costs and continuous improvement, as well as measuring and analyzing quality costs for the Directorate of Electricity Supply / Middle Euphrates and continuous improvement of the distribution of electrical energy,The problem was represented by the high costs of failure and waste in electrical energy result to the excesses on the network and the missing (lost) energy,Thus, measuring and analyzing quality costs for the distribution of electrical energy and identifying continuous improvement leads to a reduction in missing and an increase in sales, as the research reached many conclusions, the most important of which is the high percentage o
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe research aimed at designing teaching program using jigsaw in learning spiking in volleyball as well as identifying the effect of these exercises on learning spring in volleyball. The researchers used the experimental method on (25) students as experimental group and (27) students as controlling group and (15) students as pilot study group. The researchers conducted spiking tests then the data was collected and treated using proper statistical operations to conclude that the strategy have a positive effect in experimental group. Finally, the researchers recommended using the strategy in making similar studies on other subjects and skills.
The History of Multi Parties and its Effect on Political System in India