In latest decades, genetic methods have developed into a potent tool in a number of life-attaching applications. In research looking at demographic genetic diversity, QTL detection, marker-assisted selection, and food traceability, DNA-based technologies like PCR are being employed more and more. These approaches call for extraction procedures that provide efficient nucleic acid extraction and the elimination of PCR inhibitors. The first and most important stage in molecular biology is the extraction of DNA from cells. For a molecular scientist, the high quality and integrity of the isolated DNA as well as the extraction method's ease of use and affordability are crucial factors. The present study was designed to establish a simple, fast and inexpensive method for DNA extraction from human peripheral blood (normal male n=2, age 24 years old, patient male (prostate cancer) n=2, age 65 years old) by comparing between them, and aimed to standardize a protocol of DNA extraction using five extraction protocols. The first method was the modified organic method by using sodium perchlorate instead of organic solvent (phenol, chloroform), sodium perchlorate advantage comes from its cheap price and low storage and shipping requirements, the second was the enzymatic method by using proteinase K, third method was done by using detergent, the fourth used phenol-chloroform; finally fifth one was salting out method. The result showed that the organic method gives a good DNA yield and needs relatively short time while the enzymatic method gives an excellent DNA purity which are more suitable for PCR by comparing five protocols using the spectrophotometer and Nanodrop technetium in addition to electrophoresis. Through the use of the five suggested procedures, the PCR multiplication of the P53 gene with the isolated DNA was effectively carried out. This indicates that, with the exception of the detergent approach, there were no significant inhibiting substances for Taq polymerase in the final solution.
Retained soft tissue foreign bodies following injuries are frequently seen in the Emergency and Plastic Surgery practice. The patients with such presentations require a watchful and detailed clinical as- sessment to overcome the anticipant possibility of missing them. However, the diagnosis based on the clinical evaluation is usually challenging and needs to be supported by imaging modalities that are suboptimal and may fail in identifying some types of foreign bodies. Owing to that, serious complications such as chronic pain, infection, and delayed wound healing can be faced that necessitate a prompt intervention to halt those detrimental consequences. The classical method of removal is a surgical exploration which is not free of risks.
... Show MoreThe development of economic and environmentally friendly extractants to recover cobalt metal is required due to the increasing demand for this metal. In this study, solvent extraction of Co(II) from aqueous solution using a mixture of N,N0-carbonyl difatty amides (CDFAs) synthesised from palm oil as the extractant was carried out. The effects of various parameters such as acid, contact time, extractant concentration, metal ion concentration and stripping agent and the separation of Co(II) from other metal ions such as Fe(II), Ni(II), Zn(III) and Cd(II) were investigated. It was found that the extraction of Co(II) into the organic phase involved the formation of 1:1 complexes. Co(II) was successfully separated from commonly associated metal
... Show MoreLeaching process applied for the extraction of bio active compounds from dried roots of (Elecampane) Inula helenium. Ethanol, hexane and distillated water were used as solvents. Roots were soaked with ethanol (5% w/v) with various concentration of ethanol (30 to 98%) at one day to know effect concentration of the solvent with concentration of bio active compound in Inula helenium. The same procedure was done using hexane as solvent. Also distilled water was used as solvent for extraction 5%(w/v) where plant material was soaked in water at different temperatures (25, 40, 65, 80, and 90) C. In all solvents undertaken, the effect of time duration on active ingredient (Thymol, Isoalatolactone, Alatolactone, 10-isobutyryl-oxy 8-9-epoxy thymol is
... Show MoreDevelopment and population expansion have the lion's share of driving up the fuel cost. Biodiesel has considerable attention as a renewable, ecologically friendly and alternative fuel source. In this study, CaO nanocatalyst is produced from mango leaves as a catalysis for the transesterification of waste cooking oil (WCO) to biodiesel. The mango tree is a perennial plant, and its fruit holds significant economic worth due to its abundance of vitamins and minerals. This plant has a wide geographical range and its leaves can be utilized without any negative impact on its growth and yield. An analysis was conducted to determine the calcium content in the fallen leaves, revealing a significant quantity of calcium that holds potential fo
... Show MoreIntellectual property rights of all kinds، and their nature، are considered a tool in the hands of their owner that enables him to monopolize the benefits that you confer on them without any dispute or mediation from anyone. Intellectual property on its intellectual product، and preventing others from exploiting it without obtaining the permission of its owner All of this is reflected positively on the progress of the industrial and commercial field، and this justifies the protection provided by the laws regulating intellectual property rights to its owner، whether at the national or international level، and with our recognition of the right of the owner of intellectual property rights to enjoy the exclusive use of his right، and
... Show MoreFlying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct
... Show MoreThis research aims at answering many questions raised by the research problem concerning the view of the organizations under consideration for the concept of smart leadership and its most important dimensions, as well as the view of crisis management and its concept and most important methods through research objectives that define and clarify the smart leadership with its dimensions and methods of crisis management.
For the purpose of reaching the results of the research and testing the assumptions about the relationship between smart leadership and methods of crisis management, the researcher adopted a questionnaire, designed especially to be a criterion for the research, as the main tool for data coll
... Show MoreSystemic lupus erythematosus (SLE) is the prototypic multisystem autoimmune disorder with a broad spectrum of clinical presentations encompassing almost all organs and tissues. Aimes of study determination of integrin- linked kinase 1(ILK-1) and anti-smith antibody(ASAB) levels in serum of Iraqi patients with systemic lupus erythematosus, in addition, that ILK-1 may be as a diagnostic marker of SLE disease, and study the effect of systemic lupus erythematosus on renal function in these patients. This study included 100 females’ patients with systemic lupus erythematosus attending to the Rheumatology Unit in Baghdad Teaching Hospital, Medical City, (Baghdad), in addition to 30 healthy females as controller group were chosen without any chr
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThe Rate theory of crack growth in PVC pipe has been studied for creep and fatigue crack propagation. Rate theory function parameters, (RTFP), were estimated theoretically from exponential function parameters, (EFP), to experimental data of crack velocity versus stress intensity factor ,(V-K) diagram, to creep crack propagation . Also (RTFP) were estimated theoretically from (EFP) to experimental data of (V-?K) diagram to fatigue crack propagation. Temperature effect with (RTFP) was discussed. Crack velocity function denoted with stress intensity factor and temperature degrees has been determined to fatigue and creep crack propagation theoretically and comparative results this function with experimental data of (V-K or ?K) diagram .