Preferred Language
Articles
/
ijs-8806
The Correlation Study between TP53 Gene Expression and Acute Myeloid Leukemia in Iraq
...Show More Authors

     Acute myeloid leukemia represents the most prevalent type of acute leukemia in adults. Mutations in the tumor protein (TP53) gene have been found in more than half of all human cancers. This study was done to investigate the relationship between TP53 gene expression and the appearance and progression of acute myeloid leukemia in Iraq. This study included 100 subjects, divided into 60 patients suffering from pre-diagnostic acute myeloid leukemia and 40 healthy individuals. The difference in TP53 gene expression between acute myeloid leukemia patients and healthy individuals has been investigated, and the gene expression of TP53 has been measured after extraction of total RNA at concentrations (15–83 ng/µl) and purity (1.76-2). Gene expression has involved calculating the double ΔCt value to assess TP53 expression in the presence of the GAPDH gene as a reference gene. Results showed that gene expression folding (2-∆∆Ct) reflects significant differences in TP53 gene expression. There was overexpression (up-regulation) of the TP53 gene in acute myeloid leukemia patients (mean ± SD: 2.29±2.12) compared with controls (1 ± 0.43), with a p=0.04.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhancing the Lifting Capacity of Drilling Fluids in Vertical Oil Wells
...Show More Authors

Of the many functions that are performed by the drilling fluid, the most important is to transport cuttings from the bit up the annulus to the surface. Various drilling fluid have been widely used in the oil industry to improve lifting capacity. In this study, three mud type have been used which they are, oil base mud, X-anthan polymer and a mixture of CMC and bentonite ,by using Carrying Capacity Index  calculation (CCI) , the Xanthan  gave good values of CCI than other studied drilling fluid. By using Sifferman chart and field data from well in south of Iraq and API equation to find cutting concentration in the annulus, The results showed that the used of thick mud increase the lifting capacity and decrease volumetric drill c

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Construction Research Congress 2022
Impact of Green Construction on Safety Performance in the Built Environment
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Route Educational And Social Science Journal
SURVIVAL IN TIMES OF PANDEMICS: THE PROPHETIC VISION OF JACK LONDON
...Show More Authors

View Publication
Publication Date
Wed May 15 2019
Journal Name
حوليات عين شمس
Mythological Allusions in Christopher Marlowe's The Tragical History of Doctor Faustus
...Show More Authors

A Classical allusion refers to myths in ancient Roman and Greek works of literature. Christopher Marlowe (1564-1593), utilized mythological allusions in The Tragical History of Doctor Faustus (1588- 1592) to create a connection between ideas. Dr. Faustus wanted the infinite. He sold his soul to the devil to gain it. He rejected theology and embraced magic and mythology that epitomized pseudo-divinity. Classical mythology invites moral and theological discussion. It intensifies the aesthetic purpose and the spiritual evaluation of Dr. Faustus‟s ambition

View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
مجلة العلوم النفسية
Emotional sensitivity in children from the parents' point of view Preparation
...Show More Authors

The current research aims to: 1- Identify the emotional sensitivity of children from the parents' point of view. 2- Identifying the differences in the emotional sensitivity of children from the parents ’point of view, according to the parents’ gender variable (father - mother). The basic research sample consisted of (285) male and female students from the sixth grade (primary school), chosen in a randomized stratified method from the districts (Al-Karkh and AlRasafa). While the sample of statistical analysis amounted to (200) father and (200) mothers of male and female students who were randomly selected from the sixth grade of the education directorates (Al-Karkh and Al-Rasafa). The two researchers also used a number of sta

... Show More
View Publication
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Science
Applications of Camera Total Station System (CTSS) in the Construction Surveying
...Show More Authors

AZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012

View Publication
Publication Date
Wed Aug 11 2021
Journal Name
مجلة القانون الدستوري والعلوم الادارية
  The role of positive psychological capital in activating sustainable performance standards
...Show More Authors

اعداد : أسرار عبد الزهراء علي - علاء الدين - ب. جواد  حسن عودة عبد الله  - جامعة بغداد جامعة بغداد كلية البصرة للعلوم والتكنولوجيا - كلية الإدارة والاقتصاد. كلية الإدارة والاقتصاد المركز الديمقراطي العربي –   مجلة القانون الدستوري والعلوم الإدارية : العدد التاسع شباط – فبراير 2021 المجلد 3 ،

View Publication
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Randomness of Stream Cipher Digital Sequences in the Field GF(28)
...Show More Authors

     A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field  to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Al-kindy College Medical Journal
Role of Loop Ileostomy in the Management of Ulcerative Colitis Patients
...Show More Authors

Background: Ulcerative colitis is a chronic inflammatory condition characterized by relapsing and remitting episodes of inflammation limited to the mucosal layer of the colon.Loop ileostomy might be helpful in the management of the disease.

Objective: To evaluate the role of loop ileostomy in the management of ulcerative colitis.

 Methods: Between Januarys 2008 and January 2018, patients with fulminant ulcerative colitis resistant to medical therapy had been referred to our surgical unit and were included in our study. Assessment of the patients’ medical status (serum electrolytes, total serum protein, complete blood count, erythrocyte sedimentation rate, general stool exam,and abdominal ultrasound

... Show More
View Publication Preview PDF
Crossref (1)
Crossref