Abstract: The present study aimed to evaluate calcium, potassium, albumin, protein, creatinine, urea, uric acid levels, and the level of total sialic acid in the sera of patients with chronic renal failure who had been infected with Hepatitis C virus and in the sera of patients with chronic renal failure, and compare them with healthy volunteers. A total of 90 subjects with age 25-55 years, were divided into three groups. G1 represents 30 patients with chronic renal failure who had treated by dialysis and infected with chronic Hepatitis C virus (positive group). G2 represents 30 patients with chronic failure who had been treated by dialysis (negative group), while G3 represents 30 healthy volunteers (control group). The results showed that the calcium, albumin, protein, and uric acid levels were decreased significantly (P≤0.05) in serum of G1 and G2 as compared with healthy group (G3). While levels of Potassium, creatinine, urea, and total sialic acid were significantly (P≤0.05) increased in serum of G1 and G2 as compared to G3. In conclusion patients with renal failure whom suffering from chronic hepatitis C, which they are serious diseases in Iraq; and although hemodialysis is an attempt to keep homeostasis in the patients, but it is not easy to retain them from the risk of mortality.
The study seeks to investigate the effect of Dunn Dunn learning style model on students’ achievement. Besides, the way of developing students’ deductive thinking by testing the null hypothesis: there is no significant difference between experimental group who takes Dunn Dunn model as style in studying geography and control group that follows a traditional method in studying geography at the level of (0,05). Additionally, there is no significant difference between experimental group who takes Dunn Dunn model as style in studying geography and control group that follows a traditional method in studying geography at the level of (0,05) on testing developing deductive thinking skills. The researcher adopted a quasi-experimental posttest
... Show MoreObjective: To study the protective eff ects of cinnamic acid on dextran sodium sulfate (DSS) induced ulcerative colitis (UC) in mice. Materials and methods. Forty adult male mice were randomLy divided into fi ve groups, control group, an induction group received 3% DSS in drinking water for 7 consecutive days. Two treatment groups received oral suspension of cinnamic acid 50 and 25 mg/kg, respectively and 3% DSS in drinking water, for 7 consecutive days. The fi nal group received oral suspension of cinnamic acid 50 mg/kg for the latter 7 days without DSS in drinking water. All the animals were euthanized on day eight. The colon of animals was extracted and divided into two sections, the middle was homogenized and biochemically analy
... Show MoreThe Jeribe Formation, the Jambour oil field, is the major carbonate reservoir from the tertiary reservoirs of the Jambour field in northern Iraq, including faults. Engineers have difficulty organizing carbonate reserves since they are commonly tight and heterogeneous. This research presents a geological model of the Jeribe reservoir based on its facies and reservoir characterization data (Permeability, Porosity, Water Saturation, and Net to Gross). This research studied four wells. The geological model was constructed with the Petrel 2020.3 software. The structural maps were developed using a structural contour map of the top of the Jeribe Formation. A pillar grid model with horizons and layering was designed for each zone. Followin
... Show MoreThis study produces an image of theoretical and experimental case of high loading stumbling condition for hip prosthesis. Model had been studied namely Charnley. This model was modeled with finite element method by using ANSYS software, the effect of changing the design parameters (head diameter, neck length, neck ratio, stem length) on Charnley design, for stumbling case as impact load where the load reach to (8.7* body weight) for impact duration of 0.005sec.An experimental rig had been constructed to test the hip model, this rig consist of a wood box with a smooth sliding shaft where a load of 1 pound is dropped from three heights.
The strain produced by this impact is measured by using rosette strain gauge connected to Wheatstone
Mishrif Formation is the main reservoir in Amara Oil Field. It is divided into three units (MA, TZ1, and MB12). Geological model is important to build reservoir model that was built by Petrel -2009. FZI method was used to determine relationship between porosity and permeability for core data and permeability values for the uncored interval for Mishrif formation. A reservoir simulation model was adopted in this study using Eclipse 100. In this model, production history matching executed by production data for (AM1, AM4) wells since 2001 to 2015. Four different prediction cases have been suggested in the future performance of Mishrif reservoir for ten years extending from June 2015 to June 2025. The comparison has been mad
... Show MoreCooling towers is one of the most important unit in industry, they are used to dispose heat from cooling media used in the integrated units. The choice of the cooling media plays recently an important rule due to fresh-water scarcity. The use of saline as a cooling media become of growing interest, but the corrosion problem has to be taken in consideration. In this study the simultaneous effect of cooling tower operation parameters on the corrosion rate of mild-steel is considered. The role of NaCl content is found to be pronounced more than the working solution temperature and flowrate. The corrosion of mild-steel in these studied factors had shown an interesting result especially with the NaCl% content. Firstly, there was an increase in t
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More