In latest decades, genetic methods have developed into a potent tool in a number of life-attaching applications. In research looking at demographic genetic diversity, QTL detection, marker-assisted selection, and food traceability, DNA-based technologies like PCR are being employed more and more. These approaches call for extraction procedures that provide efficient nucleic acid extraction and the elimination of PCR inhibitors. The first and most important stage in molecular biology is the extraction of DNA from cells. For a molecular scientist, the high quality and integrity of the isolated DNA as well as the extraction method's ease of use and affordability are crucial factors. The present study was designed to establish a simple, fast and inexpensive method for DNA extraction from human peripheral blood (normal male n=2, age 24 years old, patient male (prostate cancer) n=2, age 65 years old) by comparing between them, and aimed to standardize a protocol of DNA extraction using five extraction protocols. The first method was the modified organic method by using sodium perchlorate instead of organic solvent (phenol, chloroform), sodium perchlorate advantage comes from its cheap price and low storage and shipping requirements, the second was the enzymatic method by using proteinase K, third method was done by using detergent, the fourth used phenol-chloroform; finally fifth one was salting out method. The result showed that the organic method gives a good DNA yield and needs relatively short time while the enzymatic method gives an excellent DNA purity which are more suitable for PCR by comparing five protocols using the spectrophotometer and Nanodrop technetium in addition to electrophoresis. Through the use of the five suggested procedures, the PCR multiplication of the P53 gene with the isolated DNA was effectively carried out. This indicates that, with the exception of the detergent approach, there were no significant inhibiting substances for Taq polymerase in the final solution.
الخلفية: إن سمية الدواء والآثار الجانبية للعلاج الكيميائي تؤثر سلبا على مرضى سرطان الثدي. الأهداف: لتقييم فعالية التدخلات الصيدلانية في تحسين معرفة مرضى سرطان الثدي ومواقفهم وممارساتهم فيما يتعلق بالعلاج الكيميائي لسرطان الثدي.
Background: Peripheral giant cell lesion (PGCL) and central giant cell lesion (CGCL) of the jaws have a distinct clinical behavior.Giant cell tumour (GCT) is a benign locally aggressive neoplasm affects the long bones. Both lesions are characterized histologically by multinucleated giant cells in a background of ovoid to spindle-shaped mesenchymal cells. The WW domain-containing oxidoreductase (WWOX) gene is located at 16q23.1–16q23.2, a region that spans the second most common human fragile site, FRA16D, at 16q23.2.The Ki-67 antigen is a nuclear protein that is associated with and may be necessary for cellular proliferation.Ki-67 protein is present during all active phases of the cell cycle (G1, S, G2, and mitosis), but is absent fr
... Show MoreStylistics represents a modern approach in understanding the literary text through the linguistic patterns that form it. The distinctive phenomena that the text includes constitute special features in it. As well as exploring its aesthetic aspects through description and analysis at the same time. The close link between stylistics and linguistics made stylistics occupy a prominent place in modern literary criticism.
In this regard, we do not want to dwell on the different directions of stylistics. Rather, we will prolong the discussion in the study of the style as a (deviation. Aversion) from the original. Because this trend plays on the chord of the paradox between the surface structure and the deep structure, especially when the sur
The present research included synthesis of silver nanoparticle from(1*10-3,1*10-4 and1*10-5) M aqueous AgNO3 solution through the extract of M.parviflora reducing agent. In the process of synthesizing silver nanoparticles we detected a rapid reduction of silver ions leading to the formation of stable crystalline silver nanoparticles in the solution.
Chronic myeloid leukemia (CML) is a myeloproliferative disorder characterized by the presence Philadelphia chromosome (Ph) which was created by a reciprocal translocation between chromosomes 9 and 22 (t [9;22] [q34;q11]. The approval of the 2nd generation TKI ( Nilotinib) takes the treatment of CML patients into new erea with more efficiency and mild to moderate adverse effects. This study was aimed at evaluation of molecular cytogenetic response by (FISH) for Nilotinib in Iraqi patients with assessment for electrolytes disturbances of Nilotinb by measuring a panel of electrolyte (Na+, K+, Ca++, PO4--- and Mg++) , where thirty Iraqi patients with CML who have resistance or no response to Imatinib treatment, attending to Baghdad Teaching Ho
... Show MoreThe current research aims to evaluate the level of inclusive leadership within the General Secretariat for the Council of Ministers, and its role in achieving integration in work through the need to improve relationships between different administrative levels, facilitate participation, expression of opinions, and belonging to the organization. In order to achieve the research objective, the descriptive analytical statistical method was chosen using the SPSS V.25 programs, with various statistical methods and measures, including mean, standard deviation, variance coefficient, relative importance, and simple regression, through a questionnaire tool for data collection. The research community included the leadership in the sample of resear
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreBackground: The aim of this study was to determine phototoxic effect of visible blue light on anaerobic periodontal pathogens namely Aggregatibacter actinomycetemcomitans and Porphyromonas gingivalis. Materials and methods: Strains of Aggregatibacter actinomycetemcomitans and Porphyromonas gingivalis were isolated from pockets of systemically healthy patients aged between 35-55 years old with pocket depths of 5-6 mm, the bacteria cultured on special blood Agar plates solid media, then subjected to visible blue light emitted from commercially available light cure devise (LED curing light); that emits blue light (400-500nm) of 1000mw energy at different periods of time exposures, then the CFU of each plate was measured by direct colony count
... Show More