The Growth Differentiation Factor -15 (GDF-15) is a member of the transforming growth factor β superfamily. İt represents an example of the stress response cytokines. It's mostly found in cardiac myocytes, adipocytes, macrophages, endothelial cells, and vascular endothelial cells, whether they're generated normally or not. GDF-15 levels have increased and are associated with cardiovascular risk. Aim of the study: To investigate the correlation between angiotensin-converting enzyme (ACE) inhibitors and angiotensin II receptor blockers (ARBs) with the level of plasma GDF-15 in a group of hypertensive patients. Materials and methods: A case-control study involved 90 individuals, 60 hypertensive patients (36 on ACE inhibitors and 24 on ARBs)
... Show MoreBACKGROUND: Hepatocyte growth factor (HGF) is a proangiogenic factor that exerts different effects over stem cell survival growth, apoptosis, and adhesion. Its impact on leukemogenesis has been established by many studies. AIM: This study aimed to determine the effect of plasma HGF activity on acute myeloid leukemia (AML) patients at presentation and after remission. PATIENTS AND METHODS: This was a cross-sectional prospective study of 30 newly-diagnosed, adult, and AML patients. All patients received the 7+3 treatment protocol. Patients’ clinical data were taken at presentation, and patients were followed up for 6 months to evaluate the clinical status. Plasma HGF levels were estimated by ELISA based methods in the pa
... Show MoreAbstract
This research deals with studying and analysis of a poetic group under the
title (Trees behind fence) of the great poet Dr. Ahmed Sulaiman AlAhmed
who is the some of the Shek , Sulaiman Al-Ahmed who is the linguist - poet
and famous jurist member in the Arabic scientific assemble in Damascus and
brother of the great poet Badawi Al-Jabal. This poetic group include two big
poetic legends : the first one is (Trees behind fence , ) which include one
hundred and eighty four line and the second one ( AZ-Mebadia ) which is
consists of one hundred and seventy eight line, both of them from the (Al-
Camil ) meter which is free rhyme which bears a many meaning and pictures
and just the great poet composite the
Colorectal cancer CRC is the third most commonly diagnosed cancer in males and the second in female, so it is a common and life-threatening disease serum of 48 males and 40 females suffering from CRC disease as group one (G1) without taking a chemotherapy dose, the same patients group tow (G2) after taking the first chemotherapy dose, while group three (G3) whose patients in (G1) and (G2) after second taking a chemotherapy dose. and group four (G4) consist of (30 males and 30 females) healthy Iraqi control. Results showed a significant increase in IL-17, IL-17RA and CEA in G1, while there was a significant decrease in vitamin D concentration in G1 than other groups, also there was positive (+ ve) significant correlation between IL-17 and CE
... Show Moreβ-thalassaemia consists of 3 chief forms: thalassaemia primary (other called "cooley's Anaemia" or "Mediterranean durability Anaemia"), thalassaemia intermedia or thalassaemia minor also frequent termed "β-thalassaemia carrier", "β-thalassaemia trait" however, "heterozygous β-thalassaemia". separately from the rare magisterial forms, problem along β-thalassaemia essential are homozygotes or made heterozygotes because B0 and B+ genes, problem including thalassaemia intermedia are typically homozygotes and compound heterozygotes then subjected with thalassaemia minor are broadly heterozygotes.
In this study, we t
... Show MoreArcHydro is a model developed for building hydrologic information systems to synthesize geospatial and temporal water resources data that support hydrologic modeling and analysis. Raster-based digital elevation models (DEMs) play an important role in distributed hydrologic modeling supported by geographic information systems (GIS). Digital Elevation Model (DEM) data have been used to derive hydrological features, which serve as inputs to various models. Currently, elevation data are available from several major sources and at different spatial resolutions. Detailed delineation of drainage networks is the first step for many natural resource management studies. Compared with interpretation from aerial photographs or topographic maps, auto
... Show MoreIn this work, a simple and very sensitive cloud point extraction (CPE) process was developed for the determination of trace amount of metoclopramide hydrochloride (MTH) in pharmaceutical dosage forms. The method is based on the extraction of the azo-dye results from the coupling reaction of diazotized MTH with p-coumaric acid (p-CA) using nonionic surfactant (Triton X114). The extracted azo-dye in the surfactant rich phase was dissolved in ethanol and detected spectrophotometrically at λmax 480 nm. The reaction was studied using both batch and CPE methods (with and without extraction) and a simple comparison between the two methods was performed. The conditions that may be affected by the extraction process and the sensitivity of m
... Show MoreThe art of calligraphy is regarded as one of the tremendous and distinct products in the history of Islamic arts through the unparalleled high ranks it reached to, until it gained Islam's indication and became a symbol for it, in terms of its function linked to the calligraphy of the holy Qur'anic texts, where this merit formed a strong impulse in seeking its development, the emergence of the calligraphic constructs, including the calligraphic straps, is one of this continual seeking products, and an advanced stage at the level of technical and expressive development, and also one of the natural results generated by the development of fonts and the increase of their employing methods through what they recorded at the level of formal char
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More