Chronic myeloid leukemia (CML) is a myeloproliferative disorders characterized by formation of Philadelphia chromosome. After disease development, several events may associate with the reduction of anti-tumor immunity. The present study was designed to investigate the immunological profile of innate and adaptive immune response in Iraqi patients with CML. Patients were grouped into untreated (UT), treated (T) with chemotherapy, while another apparently healthy individuals were recruited to represent the control (C) group. Methods: ELISA technique was used to estimate serum levels of GM-CSF, IL-1a, IL-8, IL2, INF-?, IL-4, and IL-10 while SRID was used to estimate serum levels of C4, IgM, IgA, and IgG. Results: Regarding to innate immune response, C4 levels significantly reduced in UT and T groups, whereas IL-8increased significantly in UT and T groups. However, there is a non-significant difference in IL-1a and GM-CSF levels. In adaptive immunity, IL-2 in UT and T groups, while IFN-? levels decreased with high significant difference in both UT and T groups, although non-significant change were noticed in levels of IL-4 and IL-10. Similarly, IgM and IgA concentrations were not affected, with an exception that IgG concentration significantly elevated in treated group. In conclusion, CML disease could modulate the engines of immune response in untreated and during chemotherapy treatment which consequently changes the mechanism of antitumor immunity.
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreForm naming system Simiaúaa can not be studied in isolation from the dimensionality of social and psychological , no doubt that names carry data psyche during social interaction , deflagration volunteered her body signifier in formats that meet the margin emotional part of the signified , Vtngams forms functions in coordinated trading to function as semantic double , it operates on coding , as well as carry emotional charge .
The science of semiotics cares Pettmvsal indications and forms of circulation, and is made form the semantic patterns , and pattern of production , and methods of functioning . Stop quite a few specialists and critics and researchers at Dalia ignorant poet and knight known ( Duraid bin embolism Jashmi ) ; it rep
Gypseous soil is prevalent in arid and semi-arid areas, is from collapsible soil, which contains the mineral gypsum, and has variable properties, including moisture-induced volume changes and solubility. Construction on these soils necessitates meticulous assessment and unique designs due to the possibility of foundation damage from soil collapse. The stability and durability of structures situated on gypseous soils necessitate close collaboration with specialists and careful, methodical preparation. It had not been done to find the pattern of failure in the micromechanical behavior of gypseous sandy soil through particle image velocity (PIV) analysis. This adopted recently in geotech
Voice studies are one of the sensory studies of their first association with auditory taste, which broadcasts its connection to the most sensory point contained in the physical corners, and in order to satisfy our conscience from these fundamental voices, we searched for in modern contexts, high proportions related to the words of Muhammadiyah, so we are looking for (events In the hadiths of the Prophet (peace be upon him), to settle our journey when the true adhkaar received from the Prophet, peace be upon him, and to control us start a journey through which we repeat between the cities of audio repetitions, sometimes we find ourselves have stood at the entrance of what corresponds to the sounds between the title of the Hadith and its t
... Show MoreBackground: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date. Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magneti
... Show MoreThe problem of poverty and deprivation constitute a humanitarian tragedy and its continuation may threaten the political achievements reached by the State. Iraq, in particular, and although he is one of the very rich countries due to availability of huge economic wealth, poverty indicators are still high. In addition, the main factor in the decline in the standard of living due to the weakness of the government's performance in the delivery of public services of water, electricity and sanitation. Thus, the guide for human development has been addressed which express the achievements that the state can be achieved both on a physical level or on the human level, so in order to put appropriate strategies and policies aimed at elimin
... Show MoreCollective C2 transitions in 32S are discussed for higher
energy configurations by comparing the calculations of transition
strength B(CJ )with the experimental data. These configurations
are taken into account through a microscopic theory including
excitations from the core orbits and the model space orbits with nħω
excitations.
Excitations up to n=10 are considered. However n=6 seems to
be large enough for a sufficient convergence. The calculations
include the lowest seven 2+0 states of 32S.
The working of the some designer was recognize by the Production and introduction of the design which have special stemp and style determind by the experience and the Knowledge ability for the Designer which change the ordinaries shape to the develops shaps bening ideas and new meanings un known to the viewen make the design at high level of creative and the designer acquest experiennce and new skill in his way for the designs and the art march-out which clearly demonstrate on all the graphical work so the high research conserned on the knowledge and detect about the methods constructing of the ability and expernence for the graphic designer become it is decisive worker in effective or net effective the designers work and any consist whi
... Show MoreThe present study attempts to give a detailed discussion and analysis of parenthetical constructions in English and Arabic, the aim being to pinpoint the points of similarity and difference between the two languages in this particular linguistic area.The study claims that various types of constructions in English and Arabic could be considered parenthetical; these include non-restrictive relative clauses, non-restrictive appositives, comment clauses, vocatives, interjections, among others. These are going to be identified, classified, and analyzed according to the Quirk grammar - the approach to grammatical description pioneered by Randolph Quirk and his associates, and published in a series of reference grammars during the 1970
... Show More