Preferred Language
Articles
/
iqjmc-1219
Lymphocyte subsets phenotype in patients with infectious mononucleosis
...Show More Authors

Background: Infectious mononucleosis (IM) is a lymphoproliferative disease caused primarily by the Epstein-Barr virus (EBV) infection. The initial viral infection by EBV occurs in B lymphocytes and is followed by an extensive proliferation of T lymphocytes. Previous studies on immunity to EBV (including IM) have mainly focused on activation of peripheral blood T cells, which are responsible for the lymphocytosis in blood during acute IM.
Patients and Methods: Indirect immunofluorescence technique analysis was performed to detect the percentage of CD3, CD4, CD8, CD19, and CD56 positive lymphocytes.
Results: Our results on the phenotype of T cells in samples from patients with infectious mononucleosis showed that there is a significant increase in percentage of CD8+ T-cells when compared with healthy group. In addition, increased in percentage of CD3 T-cells and moderately increase in CD56 (NK) cells. CD4 and CD19 percentage were significantly decrease in comparison with healthy control.
Conclusion: Acute infectious mononucleosis is characterized by a marked increase in the percentage of CD3 and CD8 T- cells with a slight increase in CD56 percentage. A marked decrease in CD19 percentage and CD4/CD8 ratio was noticed.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Randomness of Stream Cipher Digital Sequences in the Field GF(28)
...Show More Authors

     A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field  to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 24 2020
Journal Name
Journal Of Engineering
Using Steel Slag for Stabilizing Clayey Soil in Sulaimani City-Iraq
...Show More Authors

The clayey soils have the capability to swell and shrink with the variation in moisture content. Soil stabilization is a well-known technique, which is implemented to improve the geotechnical properties of soils. The massive quantities of waste materials are resulting from modern industry methods create disposal hazards in addition to environmental problems. The steel industry has a waste that can be used with low strength and weak engineering properties soils. This study is carried out to evaluate the effect of steel slag (SS) as a by-product of the geotechnical properties of clayey soil. A series of laboratory tests were conducted on natural and stabilized soils. SS was added by 0, 2.5, 5, 10, 15, and 20% to the soil.

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Advances In Animal And Veterinary Sciences
Gentamicin enhances toxA expression in Pseudomonas aeruginosa isolated form cow mastitis
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 17 2019
Journal Name
Journal Of Interdisciplinary Mathematics
Generalized closed fuzzy soft sets in Čech fuzzy soft closure spaces
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jul 28 2022
Journal Name
Mechanics Based Design Of Structures And Machines
Experimental investigation on the damping characteristics in dry and saturated sands
...Show More Authors

Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jul 05 2023
Journal Name
Journal Of Pragmatics Research
Analysis of Impoliteness Strategies Used in Putin's Speech at Annexation Ceremony
...Show More Authors

This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Role Of ψ-Operator in the Study of Minimal Open Sets
...Show More Authors

     The operator ψ has been introduced as an associated set-valued set function. Although it has importance for the study of minimal open sets as well as minimal I-open sets. As a result of this study, we introduce minimal I^*-open sets . In this study, several characterizations of minimal I^*-open sets are also investigated. This study also discusses the role of minimal  I^*-open sets in the *-locally finite spaces. In an aspect of topological invariant, the homeomorphic images of minimal I^*-open set has been discussed here.

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Civil Engineering Journal
Measuring of Subjective and Objective Aesthetics in Planning and Urban Design
...Show More Authors

The article includes the concept of aesthetics through what has been dealt with in the literature by philosophers and researchers who have addressed this concept in an attempt to derive indicators of aesthetics. The article adopted a descriptive and analytical methodology by reviewing recent literature on the concept of aesthetics and its relation to urban planning and design issues. Many subjective and objective aesthetics indicators have been identified, some of which are classified under real aesthetics, and some under fake aesthetics. The indicators were applied to the Kufa Mosque complex and Sahla Mosque complex as a comparative case study. It was found that the indicators of real aesthetics have a higher weight in determining

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ibn Al- Haitham Journal For Pure And Applied Sciences
Gene Expression of NLRP3 Inflammasome in Celiac Disease of Iraqi Children
...Show More Authors

Celiac disease (CD) is an autoimmune disorder characterized by chronic inflammation that essentially affects the small intestine and is caused by eating gluten-containing foods. This study sought to determine gene expression of NLRP3 Inflammasome in peripheral blood of Iraqi CD children using quantitative real-time PCR (qRT-PCR) assay. Thirty children with CD (12 males and 18 females) were enrolled in the study and their age range was 3-15 years. The diagnosis of the disease was confirmed by serological examinations and intestinal endoscopy. A control sample of 20 age-matched healthy children was also included. The children were stratified for age, gender, body max index (BMI), histological findings, and marsh classification. Furthe

... Show More
Crossref (1)
Crossref