During recent years, there has been an increasing interest in the investigation of the cytokines roles in pathogenesis of cancer, thus the study aimed at evaluating the level of tumor necrosis factor-alpha(TNF-?) in sera of Iraqi multiple myeloma (MM) patients. Beta 2-microglobulion (?2-m) was assessed to determine if there was any association between this cytokine and the level of ?2- m, as the latter is related to the stage of the disease. In addition, the age and gender were also taken into consideration. Furthermore, we investigated the relationship between IgG and TNF-? in sera of patients. 49 Iraqi patients (27 males and 22 females).The patients were also divided into two groups: the first group included (17) patients who were recently diagnosed and not received any treatment at the time of collecting samples while the second group included (32) patients who received treatment. A further group was also investigated which included (12) apparently healthy individuals (9 males and 3 females), who were regarded as a control group. Serum TNF-? and ?2- m were determined using enzyme-linked immunosorbent assay (ELISA).while the concentration of IgG was measured by radial immune diffusion plates The study reached to the following results: TNF-? levels were not significantly elevated in the patients with MM compared to control group (5.98 ± 8.47 SD vs. 4.85 ± 12.1 SD) and no significant differences (P > 0.05) were observed in the mean (6.02 ±8.1SD vs 5.9 ±9.4SD) concentration of TNF-? in patients with MM who received treatment, when compared with those who did not take the treatment .In addition, there are positive significant correlations between TNF-? and ? 2 Microglobulin (r = 0.316, P = 0 .027), and no relationship between IgG and TNF-? (r = - 0.032, P = 0.829).Furthermore, the study observed that, there was no correlation between TNF-? on the one hand and factors of age and gender on the other hand.
This work presents experimental research using draped prestressed steel strands to improve the load-carrying capacity of prestressed concrete non-prismatic beams with multiple openings of various designs. The short-term deflection of non-prismatic prestressed concrete beams (NPCBs) flexural members under static loading were used to evaluate this improvement. Six simply supported (NPCBs) beams, five beams with openings, and one solid specimen used as a reference beam were all tested as part of the experiment. All of the beams were subjected to a monotonic midpoint load test. The configuration of the opening (quadrilateral or circular), as well as the depth of the chords, were the varia
The Local and Global Corporations are suffering of managerial and financial corruption phenomena, which leads them to loss and bankruptcy. So, it is necessary to search for tools which help prevent phenomena like this, and one of these tools is (corporate governance) which represent controlling tool that contribute in reducing corruption. this study aims at modifying (corporate governance system)in order to make it suitable with Iraqi government Corporations. the study depend upon main hypothesis which is (the performance level of the strategic perspective of governance system is depending upon work according to the perspective dimensions itself. From the main conclusions:-It is possible to building a strategic perspective
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreIn spite of the foundation of Iraqi state in 1921 and the formation of the new features of
the modern state, however, the inherited costumes and traditions sustained in the conservative
society. But due to the development that inflicted to the Iraqi society and the development of
the staff in all fields and requirement conducting to female learning. After WW II and the
1950s, women get out of their houses to seek learning by approaching the doors.
What is positive about that phase was the formation of the College of Queen A'liya
which is regarded as a positive indicator. In any case the Iraqi family encouraged women to
be indulged in higher education. Calling the college Queen A'liya
The present study attempts to give a detailed discussion and analysis of parenthetical constructions in English and Arabic, the aim being to pinpoint the points of similarity and difference between the two languages in this particular linguistic area.The study claims that various types of constructions in English and Arabic could be considered parenthetical; these include non-restrictive relative clauses, non-restrictive appositives, comment clauses, vocatives, interjections, among others. These are going to be identified, classified, and analyzed according to the Quirk grammar - the approach to grammatical description pioneered by Randolph Quirk and his associates, and published in a series of reference grammars during the 1970
... Show MoreThe current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreThis piece of research deals with assimilation as one of the phonological processes in the language. It is a trial to give more attention to this important process in English language with deep explanation to its counterpart in Arabic. in addition, this study sheds light on the points of similarities and differences concerning this process in the two languages. Assimilation in English means two sounds are involved, and one becomes more like the other.
The assimilating phoneme picks up one or more of the features of another nearby phoneme. The English phoneme /n/ has t
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreIn his post colonial novel, In the Skin of a lion, the Canadian/Sri Lankan writer,
Michael Ondaatje is so interested in the term "Post colonialism" because he wants to show
that the term doesn't only refer to a period of time that comes after colonialism. In other
words, post colonialism is not only referred to as a literal description of formerly colonial
societies. He deals with the termas a literary genre and an academic construct that describes
the global conditions of a man after a period of colonialism. He shows that post colonialism is
a theory that tries to examine and explore the different styles and faces of European authority
to control the colonized. Ondaatje's attempt through such term is to unmask Europ