Chronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation (called Ph chromosome) in hematopoietic stem cells (HSCs). This genetic abnormality results in constitutive activation of tyrosine kinase and subsequent uncontrol growth and multiplication of granulocytes. The cornerstone in treatment of CML are tyrosine kinase inhibitors, of which imatinib is the most effectively used. JAK2V617F mutation is an acquired single nucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancy other than CML. It was thought that the two genetic abnormalities (Bcr-Abl and JAK2V617F) occur mutually; however, growing body of evidences suggested the reverse. This study aimed to investigate the prevalence of JAK2V617 mutation associated with serum levels of alkaline phophatase (ALK) and lactate dehydrogenase (LDH) in Ph+ CML Iraqi patients treated with imatinib. A total of 43 Ph+ CML patients (24 males and 18 females, age range 16-80 years) who attend Iraqi National Center of Hematology for Research and Treatment/Baghdad were enrolled in this study. Each patient has been received at least six month therapy with imatinib. A consent form involving age, gender, height, weight, smoking status, residency and first family relative history of leukemia was obtained from each patient. Besides, blood samples were collected, from which the granulocytes were separated and then DNA was extracted using a ready kit. Two assays were used for detection of JAK2V617F mutation; real time polymerase chain reaction (qPCR) using specific primers and probe, and allele specific PCR (AS-PCR) using specific primers. Total white blood corpuscles (WBC) as well as serum levels of ALP and LDH were measured. qPCR assay revealed 5 patients out of 43 (11.62%) were heterozygous for the muatant allele of JAK2V617F mutation (genotype GT). The concentration of this allele ranged from 0.01% to 0.12%. None of blood sample gave positive result for AS-PCR assay. From the all risk factors, only gender had significant association with the incidence of JAK2V617F mutation (p= 0.034, OR= 0.5, 95%CI= 0.364-0.687). Average total WBC count, and serum levels of ALP and LDH were higher in JAK2V617F-positive patients (9042±1512.55, 146.05±8.028 IU/L and 204±10.85 IU/L respectively) than that of JAK2V617F-negative patients (6039±1772.239, 64.45±40.15 IU/L and 178.33±13.693 IU/L respectively) with significant differences. These results indicate that JAK2V617F mutation can occur simultaneously with Ph chromosome in CML patients, and qPCR is a highly sensitive method for the detection of this mutation. Furthermore, serum activity of APL can be used as an indicator for the presence of JAK2V617F mutation in CML patients.
Evaluation of the Serum Level of Interleukin-6 in Patients Undergoing Surgical Removal of Impacted Mandibular Third Molars, Hussain A Taher*, Salwan Y Bede
In this work, animal bones with different shapes and sizes were used to study the characteristics of the ground penetrating Radar system wares reflected by these bones. These bones were buried underground in different depths and surrounding media. The resulting data showed that the detection of buried bones with the GPR technology is highly dependent upon the surrounding media that the bones were buried in. Humidity is the main source of signal loss in such application because humidity results in low signal-to-noise ratio which leads to inability to distinguish between the signal reflected by bones from that reflected by the dopes in the media such as rock .
bstract This study was performed to isolate and identify the Burkholderia cepacia from rhizosphers of different plants and study their ability to produce Siderophore, the study was also aimed to assess the antifungal activity of the bacterial filtrate and extracts of the isolates against some pathogenic fungi. The isolate which showed higher inhibitory effects was selected for extraction of some active metabolites produced by it, and evaluate the activity in vitro, via inhibition of the growth of the fungi using different concentrations of extract (50, 100, 200 )µL/ml , The results showed that out of (250) samples of soil , (8) isolates (3.2%) gave positive
... Show MoreThere is confusion between the concept of honesty and credibility arguing that their meaning is the same. ‘Credibility; is derived from the truth which means evidence of honesty, while ‘honesty’ means not lying and matching reality. The study of credibility begins globally at the end of the fifties of the second millennium to see the decline and refrain from reading newspapers, while it was studied in the Arab world in 1987. Global studies find several meanings of the concept of ‘credibility’ such as accuracy, completeness, transfer facts, impartiality, balance, justice, objectivity, trust, honesty, respect the freedom of individuals and community, and taking into account the traditions and norms.
Credibility has two dimens
The present research is aimed to know the levels of geometrical thinking of college of education " Ibn Al Haitham students I second class" . The sample of the research consists of ( 50 ) male & female students , that were chosen randomly during the academic year 2002-2003 .
To verify the aim of the study , the researcher reviewed the previous cognitive literature , and limited his study to the ( comprehending analytic , ordinal , and inferential ) levels of geometrical thinking .
He constructed a test that was consisted of ( 25 ) items . The test &nb
... Show MoreA microbial study conducted for a number of flour samples (30 samples) Uses in the bakery ovens in various areas of the city of Baghdad, by used the conventional methods used in laboratories in microbial tests and compared with the modern techniqueby usedof BacTrac Device 3400 equipped from SY-LAB Impedance analysersAustrian company.The results of two ways showed (The conventional way and BacTrac Device test)that the total counts of aerobic bacteria, coliform bacteria, StaphylococcusSpp. bacteria, Bacillus cereus bacteria and yeasts and molds,Most of them were within the permissible borders in the Iraqi standard for grain and its products With free samples from SalmonellaSpp. bacteria, and that the screening by BacTrac device are shorten
... Show MoreThe current study was carried out to find out the relationship between the Above-Ground Biomass and the spectral vegetative indices (Normalized Difference Vegetation Index, Soil Adjusted Vegetation Index, Difference Vegetation Index) (NDVI, SAVI, DVI) for soils with different salinity levels. Al Salamiyat Project was chosen as a study area located at an altitude of 34 m above sea level and within the geographical coordinates (E 44°.09´13.65´´ N 33°.25´ 07.87´´ and E 44°.17´ 46.03´´ N 33°.2l´40.72´´), with a total area of 14265 Dunum. Surface and subsurface soil samples were chosen from the study area and according to the previously defined salinity units, except for th
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More