Acute myeloid leukemia (AML) represents the most prevalent type of acute leukemia in adults and is responsible for approximately 80% of all cases. The tumor suppressor gene (TP53) is a gene that has been frequently studied in cancer, and mutations in this gene account for about 50% of human cancers. This study aims to evaluate the correlation between two single nucleotide polymorphisms (SNPs) in the gene: rs1042522 and rs1642785, and a group of Iraqi patients suffering from pre-diagnostic acute myeloid leukemia (AML). Blood samples were collected from sixty patients (26 males and 34 females) and sixty controls (26 males and 34 females); these subjects were matched in gender, age, and ethnicity. Genomic DNA has been extracted from whole frozen blood samples by using the Easy Pure® Blood Genomic Kit, and then the purity and concentration have been measured by using the Nano drop NAS-99 spectrophotometer. Nano Drop readings ranged between 7-55ng/µl for the concentration and between 1.78-1.9 for the purity. High resolution melt (HRM) real-time PCR was used in the detection of these two SNPs. TP53 genotype frequencies have been in accordance with Hardy–Weinberg equilibrium (HWE), with statistically significant differences p≤0.05 between the genotypes of the control and patient groups. The rs1042522 genotype frequency was significantly different between patients and controls p = 0.0001, and participants with the GA genotype were more likely to develop AML OR = 7.8, 95% CI 3.2–18.4, p= 0.0001. In addition, the genotype frequency of rs1642785 was significantly different between patients and controls p = 0.002, and participants with the GA genotype were more likely to develop AML OR = 3.5, 95% CI 1.5–8.12, p = 0.002.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreSubstantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show Moreتعد ظاهرة الارهاب المتزايدة في العالم من اخطر اشكال التهديدات الامنية التي تواجة الدول لانها تستهدف في جانب مهم منها امن واستقرارومستقبل مجتمعاتها لاسيما اذا جمع الفعل الارهابي بين مطامع واهداف القوى الخارجية التي لا تريد استخدام ادواتها المباشرة وانما بالاعتماد على محركات في خلق الازمات داخل الدول المستهدفة
... Show Moreيهدف البحث إلى معرفة ما هيه اخلاقيات مهنة العاملين في المكتبات وتحديث متطلباتهم الضرورية من المهنة لكي يسمو بأخلاقياتها ، وهل هذه الاخلاقيات متوافرة في العاملين في مكتباتنا الجامعية ضمن حدود الدراسة ؟ ومن ادوات جمع البيانات : استمارة بالاخلاقيات وزعت على مجموعة من الاساتذة و استبانة وزعت على من المكتبات الجامعية . وكان مجتمع الدراسة العاملون في المكتبات المركزية الأولى والثانية لجامعة بغداد والمكتبة المرك
... Show MoreThe educational function of television is one of the basic functions in light of the technical development that included the specialized satellite channels in all its fields, including the educational field, as its role became parallel to the role of educational institutions. These studies are among the descriptive studies in terms of the type of study methodology that describes the phenomenon, interprets its and extract the results and relationships between the variables. The study sample was multistage (random and intentional) included the students of the sixth academic and literary preparatory stage in the city of Baghdad.
The study problem was summarized by the following main question:
( What are the motives for the exposure of