60 patients diagnosed as having urticaria were included in the study ; 30 patients were effected with acute urticaria and 30 patients were affected with chronic urticaria. In addition, 30 healthy adult volunteers were selected as control group .The patients and control groups sera were examined with enzyme linked immunosorbent assay ( ELISA) to detect total level IgE and radial immunodiffusion (RID) to detect levels of IgG , IgA and IgM . The total level of IgE in acute urticaria ( 1.45±0.13) IU/mL and chronic urticaria (2.12 ± 0.10) IU/mL patients were significantly higher than the control groups ( 0.85 ± 0.10)IU/mL (p<0.05). The level of IgG in acute urticaria ( 12.5± 0.42) g/L and chronic (13.16±0.40) g/L patients , IgA in acute (2.5±0.2)g/L and chronic (2.39±0.19)g/L patients , and IgM in acute (1.75±0.11)g/L and chronic (1.47 ±0.07)g/L , patients were also significantly higher the control groups ( 9.79± 0.81) g/L,(1.63±0.14)g/L and (1.19±0.07) g/L respectively .The level of IgE was higher in the chronic urticaria patients than the acute urticaria stressing the importance of type-I hypersensitivity reaction in chronic urticaria .While the level of IgM was significantly higher in the acute urticaria patients than the chronic urticaria which may suggest that some cases of acute urticaria were caused by acute infections .
The Iraqi- Kuwaiti relations had witnessed a lot of problems which had its impact on them, at the fore front is the frontier issue, and the Iraqi invasion of Kuwait in 1990 which led to the severance of relations between them and had strengthened the disagreement and the dispute and raised the animosity and tension.
After 2003, Iraq has witnessed a lot of changes which affected Iraq and the region as a whole.
Under the new political developments in Iraq, a now phase has started in the relations between the two parts. which is based on the emphasis on building new relations based on the mutual respect and non intervention in the internal affairs of both countries, and in accordance with the principles of the international law, and w
This research aims at getting acquainted with the causes behind decreasing the number of beneficiaries frequenting Iraqi University Libraries through setting a rated all-psychological character
HR Al-Hamami, AA Noaimi, MM Al-Waiz, AS Al-Kabraty, Iraqi Postgraduate Medical Journal, 2010 - Cited by 4
In The Name of Allah Most Gracious Most Merciful
It is no secret to everyone that the endowment is an important nucleus for the prosperity of Islamic civilization, especially in the fields of education, health, economy, and defensive military actions that fall within the door of jihad, and so on. Al-Ashraf, Qom Al-Quds, Cairo, and other parts of the Islamic world. What we will see in the research.
DBN Rashid, International Journal of English Linguistics, 2019 - Cited by 2
Abstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More
