As many expensive and invasive procedures are used for the diagnosis or follow-up of clinical conditions, the measurement of cell-free DNA is a promising, noninvasive method, which considers using blood, follicular fluid, or seminal fluid. This method is used to determine chromosomal abnormalities, genetic disorders, and indicators of some diseases such as polycystic ovary syndrome, pre-eclampsia, and some malignancies. Cell-free DNA, which are DNA fragments outside the nucleus, originates from an apoptotic process. However, to be used as a marker for the previously mentioned diseases is still under investigation. We discuss some aspects of using cell-free DNA measurements as an indicator or marker for pathological conditions.
Hair is an excellent indicator for abnormal concentration of toxic elements , In this study a random samples from girls hair of 12 cm long were irradiated by a flux of neutrons (4x10^ n/ cm^.s) obtained from an Am-Be neutron source of 5-Ci activitity . The y-ray activity measurements were carried out by using a " 5x5 " well- type Nal (Tl) detector. The study indicates clearly that the maximum concentration of elements was at about 7 cm hair length.
Examination of 241 specimens of two bee-eater species, Merops apiaster and Merops
superciliosus persicus reveal recording of Haemoproteus meropis (Zagar, 1945) emend.
Bennett, 1978 and H. manwelli Bennett, 1978 for the first time in Iraq. A new species
Haemoproteus hudaidensis sp. nov. is described. Microfilariae are also infected the two host
species. The results are discussed with the pertinent literature and the necessary comparision
of morphometric measurements of the recorded parasites with that previously reported is
provided along with a taxonomic key including the newly described haemoproteid.
Debate is a teaching strategy in nursing education that enhances students' critical thinking. Although debate can be an effective teaching strategy, it is not without limitations. This article discusses the advantages and disadvantages of debate as a teaching strategy in nursing. Also, evaluating debates and choosing topics are highlighted.
In the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t
... Show MoreMotifs template is the input for many bioinformatics systems such codons finding, transcription, transaction, sequential pattern miner, and bioinformatics databases analysis. The size of motifs arranged from one base up to several Mega bases, therefore, the typing errors increase according to the size of motifs. In addition, when the structures motifs are submitted to bioinformatics systems, the specifications of motifs components are required, i.e. the simple motifs, gaps, and the lower bound and upper bound of each gap. The motifs can be of DNA, RNA, or Protein. In this research, a motif parser and visualization module is designed depending on a proposed a context free grammar, CFG, and colors human recognition system. GFC describes the m
... Show MoreKE Sharquie, KI Al-Hamdi, AA Noaimi, AA Al-Mohammadi, J Clin Exp Invest www. clinexpinvest. org Vol, 2011 - Cited by 1
Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show More