Acute myeloid leukemia represents the most prevalent type of acute leukemia in adults. Mutations in the tumor protein (TP53) gene have been found in more than half of all human cancers. This study was done to investigate the relationship between TP53 gene expression and the appearance and progression of acute myeloid leukemia in Iraq. This study included 100 subjects, divided into 60 patients suffering from pre-diagnostic acute myeloid leukemia and 40 healthy individuals. The difference in TP53 gene expression between acute myeloid leukemia patients and healthy individuals has been investigated, and the gene expression of TP53 has been measured after extraction of total RNA at concentrations (15–83 ng/µl) and purity (1.76-2). Gene expression has involved calculating the double ΔCt value to assess TP53 expression in the presence of the GAPDH gene as a reference gene. Results showed that gene expression folding (2-∆∆Ct) reflects significant differences in TP53 gene expression. There was overexpression (up-regulation) of the TP53 gene in acute myeloid leukemia patients (mean ± SD: 2.29±2.12) compared with controls (1 ± 0.43), with a p=0.04.
Of the many functions that are performed by the drilling fluid, the most important is to transport cuttings from the bit up the annulus to the surface. Various drilling fluid have been widely used in the oil industry to improve lifting capacity. In this study, three mud type have been used which they are, oil base mud, X-anthan polymer and a mixture of CMC and bentonite ,by using Carrying Capacity Index calculation (CCI) , the Xanthan gave good values of CCI than other studied drilling fluid. By using Sifferman chart and field data from well in south of Iraq and API equation to find cutting concentration in the annulus, The results showed that the used of thick mud increase the lifting capacity and decrease volumetric drill c
... Show MoreA Classical allusion refers to myths in ancient Roman and Greek works of literature. Christopher Marlowe (1564-1593), utilized mythological allusions in The Tragical History of Doctor Faustus (1588- 1592) to create a connection between ideas. Dr. Faustus wanted the infinite. He sold his soul to the devil to gain it. He rejected theology and embraced magic and mythology that epitomized pseudo-divinity. Classical mythology invites moral and theological discussion. It intensifies the aesthetic purpose and the spiritual evaluation of Dr. Faustus‟s ambition
Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreThe current research aims to: 1- Identify the emotional sensitivity of children from the parents' point of view. 2- Identifying the differences in the emotional sensitivity of children from the parents ’point of view, according to the parents’ gender variable (father - mother). The basic research sample consisted of (285) male and female students from the sixth grade (primary school), chosen in a randomized stratified method from the districts (Al-Karkh and AlRasafa). While the sample of statistical analysis amounted to (200) father and (200) mothers of male and female students who were randomly selected from the sixth grade of the education directorates (Al-Karkh and Al-Rasafa). The two researchers also used a number of sta
... Show MoreAZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
اعداد : أسرار عبد الزهراء علي - علاء الدين - ب. جواد حسن عودة عبد الله - جامعة بغداد جامعة بغداد كلية البصرة للعلوم والتكنولوجيا - كلية الإدارة والاقتصاد. كلية الإدارة والاقتصاد المركز الديمقراطي العربي – مجلة القانون الدستوري والعلوم الإدارية : العدد التاسع شباط – فبراير 2021 المجلد 3 ،
A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the
... Show MoreBackground: Ulcerative colitis is a chronic inflammatory condition characterized by relapsing and remitting episodes of inflammation limited to the mucosal layer of the colon.Loop ileostomy might be helpful in the management of the disease.
Objective: To evaluate the role of loop ileostomy in the management of ulcerative colitis.
Methods: Between Januarys 2008 and January 2018, patients with fulminant ulcerative colitis resistant to medical therapy had been referred to our surgical unit and were included in our study. Assessment of the patients’ medical status (serum electrolytes, total serum protein, complete blood count, erythrocyte sedimentation rate, general stool exam,and abdominal ultrasound
... Show More