In latest decades, genetic methods have developed into a potent tool in a number of life-attaching applications. In research looking at demographic genetic diversity, QTL detection, marker-assisted selection, and food traceability, DNA-based technologies like PCR are being employed more and more. These approaches call for extraction procedures that provide efficient nucleic acid extraction and the elimination of PCR inhibitors. The first and most important stage in molecular biology is the extraction of DNA from cells. For a molecular scientist, the high quality and integrity of the isolated DNA as well as the extraction method's ease of use and affordability are crucial factors. The present study was designed to establish a simple, fast and inexpensive method for DNA extraction from human peripheral blood (normal male n=2, age 24 years old, patient male (prostate cancer) n=2, age 65 years old) by comparing between them, and aimed to standardize a protocol of DNA extraction using five extraction protocols. The first method was the modified organic method by using sodium perchlorate instead of organic solvent (phenol, chloroform), sodium perchlorate advantage comes from its cheap price and low storage and shipping requirements, the second was the enzymatic method by using proteinase K, third method was done by using detergent, the fourth used phenol-chloroform; finally fifth one was salting out method. The result showed that the organic method gives a good DNA yield and needs relatively short time while the enzymatic method gives an excellent DNA purity which are more suitable for PCR by comparing five protocols using the spectrophotometer and Nanodrop technetium in addition to electrophoresis. Through the use of the five suggested procedures, the PCR multiplication of the P53 gene with the isolated DNA was effectively carried out. This indicates that, with the exception of the detergent approach, there were no significant inhibiting substances for Taq polymerase in the final solution.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThis book presents the problem of tooth decay due to bacteria Streptococcus mutans one of methods of treatment using 3 extracts of S. persica (miswak) (aqueous, acetone and methanol) and prove its effectiveness and its impact on the gtf (B, C, and D) genes that code the glucosyltransferase (Gtf) enzymes that cause decay membrane compared to the usual means used for the prevention of tooth decay
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThe most important topic for psychologist generally is factor of education and it's active tools because learning needs active perception for stimulus that recived by the educator and give it avalue and meaning , Need for cognition is
very important in the various daily fields of life , especially in learning and teaching and the academy work , it help with shifting the learning level for people , and icreas the intense and challenge between them
The research endeavored to achieve the following aim :
1- Measuring the level of peripheral perception for the university student .
2- Measuring the level of need for cognition for the university student .
3- Measuring the level of peripheral perception for the university student
Intellectual property rights of all kinds، and their nature، are considered a tool in the hands of their owner that enables him to monopolize the benefits that you confer on them without any dispute or mediation from anyone. Intellectual property on its intellectual product، and preventing others from exploiting it without obtaining the permission of its owner All of this is reflected positively on the progress of the industrial and commercial field، and this justifies the protection provided by the laws regulating intellectual property rights to its owner، whether at the national or international level، and with our recognition of the right of the owner of intellectual property rights to enjoy the exclusive use of his right، and
... Show MoreBackground: Although radiological diagnostic studies (RDS) are an important and acceptable part of medical practice, it is not without hazards. It is associated with increased risk of cancer. Unfortunately the typical and safe dose of each radiological examination is not known. Most of our knowledge of cancer risk comes from studies of survivors of those exposed to whole body radiation from atomic bomb in Hiroshima & Nagasaki, jobs associated with radiation exposure, Chernobyl survivors & patients treated with radiation therapy for cancer and other diseases.
Objectives To estimate radiation dose received by patients from diagnostic radiological examinations and lifetime
... Show MoreAbstract:
The internal control is the tool through which it is possible to verify and ensure the implementation of tasks in accordance with the established plans and programs and to evaluate the level of performance that is implemented within the different companies.
A guarantee from the supplier with the absence of a specialized technical committee that follows up the stages of implementing the contract and disbursing all amounts of financial dues to the supplier before completing the implementation of the contract and overlooking the non-implementation of some clauses of the contract by the committee in charge of
... Show Moreervical cancer is one of the most frequently diag nosed malignancies representing the fourth leading cause of cancer-related death in females’ worldwide, with approximately 500,000 new cases diagnosed and 280,000 deaths occurring each year. Mxi1, an antagonist of c-Myc, maps to human chromosome 10q24-q25, a region altered in a substantial fraction of prostate tumors, in prostate cancer, where a high frequency of loss and mutation of the MXI1 gene has been reported. The aim of present study was to find out the possible association of exon deletion of MXI1 gene with incidence of cervical abnormalities and cancers in some Iraqi married women. The present study include collection of 120 scraping cervical cells samples from women clinically di
... Show MoreResumen:
El horóscopo que es una predicción deducida de la posición de los astros del sistema solar y de los signos de Zodiaco, intenta no sólo predecir el futuro, sino también influir en el comportamiento del lector, orientándolo para que actúe adecuadamente y la invitación a actuar ante ese futuro que se aconseja mediante imperativos, perífrasis y otros recursos lingüísticos. Los horóscopos se caracterizan por su gran popularidad que existen en periódico o revista en columnas enteras dedicadas al tema, en donde se detallan la influencia que tendrá el día o el mes de cada uno de los signos correspondientes al zodíaco, siempre teniendo en cuenta la posici
... Show More