To track scientific developments and achievements, for example, that (achieved) after the Second World War until this moment, make each of us in absolute amazement. He invented the computer, discovered the genetic factor (DNA), and discovered the drawing of the human genetic map, going up to the moon, penetrating outer space by satellites, getting close to distant planets, producing jet planes, microprocessors, and lasers, in addition to enabling a person to create a layer of The material is extremely thin and extremely imaginative. It has also become possible for a person to "dig lines that do not exceed 20 billion meters of thickness." The human being was also able to collect things an atom and build an efficient and high-precision connectors, and broad capabilities to transmit information up to a billion beats per second. In the words of Toffler, this is not progress but rather a complete reversal in human life and the cognitive structure, and in the techniques and methods of tackling problems that have remained elusive for human society.
The process of knowledge enrichment was not limited to the scientific and technical side, but other great steps were made if it addressed all fields. Starting with the theory of organization, music, and study of environmental systems, brain processes, linguistics, and learning theories, in addition to studies on imbalance and chaos. And scattered installations, ending in the fields of neural networks and artificial intelligence, and then all these branches of the mentioned knowledge turned into a base for the same knowledge revolution. It directly contributed to reaching the inventions and discoveries that made a qualitative shift in the nature of knowledge itself and in man. Cognitive structure.
Background: The SARS-CoV-2 virus causes COVID-19, a respiratory syndrome. It causes inflammation and damages several organs in the body. miRNAs play a role in regulating the infection resulting from SARS-CoV-2. MicroRNA-155, a kind of microRNA linked to viral defences, can affect the immune responses during COVID-19. Objectives: Examination of the involvement of microRNA-155 in the development and severity of COVID-19, as well as finding the correlation between microRNA-155 and viral load (copies/mL) in severe cases of the disease. Materials and Method: A case-control research study was performed between October 2022 and June 2023. It included a cohort of 120 hospitalised individuals with severe cases of COVID-19, together with 115 individu
... Show MoreObjective: Certain advantages of donkeys are still not listed as for other equine species. Moreover, donkeys lack comprehensive scientific studies. The present study examines the histological architecture and histochemical characteristics of the esophagus in the Iraqi local breed donkey (Equus asinus). Materials and Methods: Eight esophagus samples were collected from a local breed donkey. Tissue specimens (~1 cm³) were collected from the cervical, thoracic, and abdominal regions of the esoph¬agus and processed via routine histological technique. The tissue sections were stained with hema¬toxylin and eosin, Massons Trichrome, and combined Alcian blue (pH 2.5) plus PAS (AB-PAS). Results: The esophagus of the local breed donkey h
... Show MoreThe accumulation of toxic elements in vegetables and melons grown in agriculture, Brassica rapa - turnip, Solanum lycopersicum - tomato, Citrullus lanatus - watermelon, Capsicum annuum - bell pepper, Daucus carota - carrots, Cucurbita pepo - pumpkin, Cucumis melo - melon, and also Prunus armeniaca - apricot from fruit trees were analyzed. The excess of maximum allowable concentrations in agricultural crops of the element As by 1.65-1.75, Cd - 1.6-2.3, Cr -1.2-2.35, Cu -1.6-3.3, Ni - 1.16-3.53, Pb - 1.54-3.08, Al - 1.36-3.5, Sb - 2.0-33, Se - 1.1-3.3 times was established. The maximum allowable concentration of mercury in vegetables and melons was equal to 0.02 mg/kg,
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: Behçet’s disease (BD) is a disorder of systemic inflammatory condition. Its important features are represented by recurrent oral, genital ulcerations and eye lesions. Aims. The purpose of the current study was to evaluate and compare cytological changes using morphometric analysis of the exfoliated buccal mucosal cells in Behçet’s disease patients and healthy controls, and to evaluate the clinical characteristics of Behçet’s disease. Methods. Twenty five Behçet’s disease patients have been compared to 25 healthy volunteers as a control group. Papanicolaou stain was used for staining the smears taken from buccal epithelial cells to be analyzed cytomorphometrically. The image analysis software has been used to
... Show More