Chronic myeloid leukemia (CML) is a myeloproliferative disorders characterized by formation of Philadelphia chromosome. After disease development, several events may associate with the reduction of anti-tumor immunity. The present study was designed to investigate the immunological profile of innate and adaptive immune response in Iraqi patients with CML. Patients were grouped into untreated (UT), treated (T) with chemotherapy, while another apparently healthy individuals were recruited to represent the control (C) group. Methods: ELISA technique was used to estimate serum levels of GM-CSF, IL-1a, IL-8, IL2, INF-?, IL-4, and IL-10 while SRID was used to estimate serum levels of C4, IgM, IgA, and IgG. Results: Regarding to innate immune response, C4 levels significantly reduced in UT and T groups, whereas IL-8increased significantly in UT and T groups. However, there is a non-significant difference in IL-1a and GM-CSF levels. In adaptive immunity, IL-2 in UT and T groups, while IFN-? levels decreased with high significant difference in both UT and T groups, although non-significant change were noticed in levels of IL-4 and IL-10. Similarly, IgM and IgA concentrations were not affected, with an exception that IgG concentration significantly elevated in treated group. In conclusion, CML disease could modulate the engines of immune response in untreated and during chemotherapy treatment which consequently changes the mechanism of antitumor immunity.
In This paper, we have been approximated Grűnwald-Letnikov Derivative of a function having m continuous derivatives by Bernstein Chlodowsky polynomials with proving its best approximation. As well as we have been solved Bagley-Torvik equation and Fokker–Planck equation where the derivative is in Grűnwald-Letnikov sense.
The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreThe nature of the dark sector of the Universe remains one of the outstanding problems in modern cosmology, with the search for new observational probes guiding the development of the next generation of observational facilities. Clues come from tension between the predictions from Λ cold dark matter (ΛCDM) and observations of gravitationally lensed galaxies. Previous studies showed that galaxy clusters in the ΛCDM are not strong enough to reproduce the observed number of lensed arcs. This work aims to constrain the warm dark matter (WDM) cosmologies by means of the lensing efficiency of galaxy clusters drawn from these alternative models. The lensing characteristics of two samples of simulated clusters in the Λ warm dark matter and ΛCDM
... Show MoreIn his opus, Ted Hughes has annexed new and fresh territories of signification to the very notion of the literary animal. Building on the earlier modernist example of the Lawrencian legacy that dwells upon the question of animalism, Hughes seems to have stepped further into the terrain of the sheer struggle when, in his hands, the grotesquerie of survival and violence energizes the topos of the literary animal in his postmodern bestiary. In Hughes’s elemental poetic process this grotesquerie and violence stages the literary animal as a vital poetic device or motif that is finally restored to the primitive power of poetry. In his “Thrushes”, he thus defamiliarizes these tiny creatures’ acts of being to bring upfront into focus thi
... Show MoreThe work in this paper focuses on the experimental confirming of the losses in photonic crystal fibers (PCF) on the transmission of Q-switched Nd:YAG laser. First HC-PCF was evacuated to 0.1 mbar then the microstructure fiber (PCF) was filled with He gas & gas. Second the input power and output power of Q-switched Nd:YAG laser was measured in hollow core photonic bandgap fiber (HCPCF). In this work loss was calculated in the hollow core photonic crystal fiber (HCPCF) filled with air then N2, and He gases respectively. It has bean observed that the minimum loss obtained in case of filling (HC-PCF) with He gas and its equal to 15.070 dB/km at operating wavelength (1040-1090) nm.
Abstract:
This study is studied one method of estimation and testing parameters mediating variables in a structural equations model SEM is causal steps method, in order to identify and know the variables that have indirect effects by estimating and testing mediation variables parameters by the above way and then applied to Iraq Women Integrated Social and Health Survey (I-WISH) for year 2011 from the Ministry of planning - Central statistical organization to identify if the variables having the effect of mediation in the model by the step causal methods by using AMOS program V.23, it was the independent variable X represents a phenomenon studied (cultural case of the
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreWireless control networks (WCNs), based on distributed control systems of wireless sensor and actuator networks, integrate four technologies: control, computer network and wireless communications. Electrostatic precipitator (ESP) in cement plants reduces the emissions from rotary kiln by 99.8% approximately. It is an important thing to change the existing systems (wireline) to wireless because of dusty and hazardous environments. In this paper, we designed a wireless control system for ESP using Truetime 2 beta 6 simulator, depending on the mathematical model that have been built using identification toolbox of Matlab v7.1.1. We also study the effect ofusing wireless network on performance and stability of the closed l
... Show MoreLearning programming is among the top challenges in computer science education. A part of that, program visualization (PV) is used as a tool to overcome the high failure and drop-out rates in an introductory programming course. Nevertheless, there are rising concerns about the effectiveness of the existing PV tools following the mixed results derived from various studies. Student engagement is also considered a vital factor in building a successful PV, while it is also an important part of the learning process in general. Several techniques have been introduced to enhance PV engagement; however, student engagement with PV is still challenging. This paper employed three theories—constructivism, social constructivism and cognitive load t
... Show More