Preferred Language
Articles
/
exdbr40BVTCNdQwCDRhV
Haemoglobin Epsilon as a Biomarker for the Molecular Detection of Canine ‎Lymphoma
...Show More Authors

Lymphoma is a cancer arising from B or T lymphocytes that are central immune system ‎components. It is one of the three most common cancers encountered in the canine; ‎lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, ‎such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of ‎canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still ‎crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic ‎conditions and to improve decision-making around treating and what treatment type to use. ‎This study aimed to evaluate a potential novel biomarker related to iron metabolism, ‎embryonic haemoglobin (HBE), for early diagnosis. Archived samples in combination with ‎prospective samples collected from dogs with and without lymphoma were used in this ‎study for the retrospective analyses of this tumor based on the same biomarker amplified by ‎real-time quantitative polymerase chain reaction. The HBE mRNA was aberrantly expressed ‎in canine B and T cell lymphoma compared to the normal lymph node tissue and ‎hyperplastic lymph nodes. In conclusion, this study identified a novel potential biomarker for improving lymphoma ‎diagnosis and treatment in dogs. Further studies with larger sample sizes are needed to ‎confirm the suitability of this biomarker for canine lymphoma diagnosis.

Scopus Crossref
View Publication
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Processes directing the scenography space in the Iraqi theatrical show Shakespeare texts as a model
...Show More Authors

Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Features of the actor's performance in the ritual theater (Iraqi theater as a model): علي شخير نفل
...Show More Authors

The features of the actor's performance in the ritual theater are of great importance and chief in theatrical work since the first emergence of the theater, as the features of the performance were embodied in all Iraqi theatrical performances, but they took personal privacy in some ritual performances because of their differences and similarities between the ritual theatrical performance and the ritual show Al-Khalis, who wanted the researcher to know the similarities and differences in the features of the ritual performance and in the theatrical performance, despite the many transformations that occurred in the theater and affected the features of the performance, but it remained an important and attractive link between the recipient, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
The semiology of culture and the sign variable in a theatre performance: Iraqi theatre as an example
...Show More Authors

The culture of theatre performance has a vital role in the process of reading the linguistic and visual signs of the performance. And the process of transforming a theatre performance from its original context into a new hosting cultural context starts from the actual reading of the text. Directors derives their new signs out of his personal culture, depending on the society where they lives and the culture that forms the social conventions, traditions and beliefs. The text is usually written within its own historical and temporal culture. The process of its production usually takes it away from its original culture, when it interprets the codes of the original writer and their visual and linguistic signs and instils new alternative sign

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 25 2022
Journal Name
Asian Journal Of Biochemistry, Genetics And Molecular Biology
Evaluation of the Simple Sequence Repeats to Work as a Phase Variation with the Neisseria meningitidis Genome
...Show More Authors

Background: The most crucial mechanism of genetic variation in N. meningitidis is the slipped strand mispairing, this mechanism generates Phase variation using simple sequence repeat (SSR) and is commonly used by the N. meningitidis to escape the immune system despite its function in eradicating the pathogenic and commensal bacteria. Some of simple sequence repeats (SSRs) that located within the genome works as phase variation while other SSRs have no role in generating phase variation mechanisms. Therefore, Aim: the main goal of the current in silico study was to detect the probability of SSR to enroll with phase variation for the entire N. meningitidis genome. Methods: Different criteria were used to judge SSR as

... Show More
View Publication
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Iraqi Postgraduate Medical Journal
The polycystic ovary syndrome as a cause of increase in inflammatory markers and metabolic risks
...Show More Authors

BACKGROUND: Polycystic ovary syndrome(PCOS) is one of the most common endocrine disorder affecting women in reproductive age. No single etiologic factor fully accounts for the spectrum of abnormalities in the polycystic ovary syndrome. Different changes in hormonal, metabolism and the inflammatory markers as squealy of PCOS with adverse effect on the women life. OBJECTIVE: To study the relationship between polycystic ovary syndrome and levels of C-reactive protein, human interleukin and hormonal and metabolic alteration in women with PCOS PATIENTS AND METHODS: Thirty women with Polycystic Ovary syndrome (PCOS) and other thirty women without PCOS were included. Venous blood samples were taken in early follicular phase of menstrual cycle [day

... Show More
View Publication
Publication Date
Sun Dec 30 2018
Journal Name
2018 Computing In Cardiology Conference (cinc)
Theoretical and Experimental Reflection Coefficients in Flexible Tubes as a Function of the Mach Number
...Show More Authors

The standard formulation of Wave Intensity Analysis (WIA) assumes that the flow velocity (U) in the conduit is <;<; the velocity of propagation of waves (c) in the system, and Mach number, M=U/c, is negligible. However, in the large conduit arteries, U is relatively high due to ventricular contraction and c is relatively low due to the large compliance; thus M is > 0, and may not be ignored. Therefore, the aim of this study is to identify experimentally the relationship between M and the reflection coefficient in vitro. Combinations of flexible tubes, of 2 m in length with isotropic and uniform circular cross sectional area along their longitudinal axes, were used to present mother and daughter tubes to produce a range of reflection coeffic

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
The Asian Efl Journal
The Effect of Flow as a Strategy on EFL Student-teachers' Performance and their Flow
...Show More Authors

This study aims at suggesting flow as a strategy for training female EFL student-teachers in the teaching training course and finding out the effect of this strategy on their performance and their flow state. The training course syllabuses will be constructed according to the flow nine factors and the teaching skills. The measurement tools are the student-teacher performance checklist that has already been used by the department of English language and SHORT Flow State Scale (S FSS-2). The study population is represented with the (60) female student-teachers/ fourth stage/ evening studies at theEnglish department /college of education for women/the University of Baghdad. The study is used the experimental design in that (30) of the student-

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sat Jun 01 2024
Journal Name
Pakistan Journal Of Criminology
Artificial Intelligence Technology in the Field of Modern Forensic Evidence: Brain Fingerprinting as a Model
...Show More Authors

Brain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining

... Show More
View Publication