Recent studies have tended to look at Mottagorat texts for seeking more of the information provided by the book for the reader, has been known by several terms Mottagorat texts, including thresholds, including the margins of the text and the parallel texts, and came this difference, according to researchers who ate the subject of research and investigation. Thus, the researchers assert that all these texts must be subjected to provide information even if propaganda of the text. Hence arose the importance of these texts in Informatics scientific material being wrapped body of the text as well as being propaganda material to evoke the recipient to read, and then to the importance of this topic, the search came on five chapters, the first chapter dealt with the researcher and the research problem, which was: What are the signs suggestive texts involved in parallel to the original text, a screenplay? The goal of the present study is to detect signs suggestive texts carried by parallel scenario surrounding the film. Chapter II also included a theoretical framework has been divided on the two themes: First, the parallel nature of the text. And second, sections and types of parallel texts. The third quarter was the search procedures, as was the research methodology is descriptive analytical method, and was the research sample is a scenario that did not (the trial). The fourth chapter is an analysis of the research sample also came fifth chapter of the findings and conclusions, the most important were:fundamental value to create meaning in the title is the font size, color, and location of the space of the interface cover, as it was the title of the research sample demonstrates the substance of the conflict through its sheer size, which, if anything, it shows the magnitude of the disaster suffered by the hero, as well as the font color was red which demonstrates the crime, murder, and others, such as the rise of so authoritarian regime will inevitably be at the expense of the fates of people and blood
Background: Adipose derived-mesenchymal stem cells have been used as an alternative to bone marrow cells in this study. Objective: We investigated the in vitro isolation, identification, and differentiation of stem cells into neuron cells, in order to produce neuron cells via cell culture, which would be useful in nerve injury treatment. Method: Mouse adipose mesenchymal stem cells were dissected from the abdominal subcutaneous region. Neural differentiation was induced using β-mercaptoethanol. This study included two different neural stage markers, i.e. nestin and neurofilament light-chain, to detect immature and mature neurons, respectively. Results: The immunocytochemistry results showed that the use of β-mercaptoethanol resulted in
... Show MoreHigh-volume traffic with ultra-heavy axle loads combined with extremely hot weather conditions increases the propagation of rutting in flexible pavement road networks. Several studies suggested using nanomaterials in asphalt modification to delay the deterioration of asphalt pavement. The current work aims to improve the resistance of hot mix asphalt (HMA) to rutting by incorporating Nano Silica (NS) in specific concentrations. NS was blended into asphalt mixtures in concentrations of 2, 4, and 6% by weight of the binder. The behavior of asphalt mixtures subjected to aging was investigated at different stages (short-term and long-term aging). The performance characteristics of the asphalt mixtures were evaluated using the Marshall s
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreBackground: In spite of all efforts, Non-small cell lung cancer (NSCLC) is a fatal solid tumor with a poor prognosis as of its high metastasis and resistance to present treatments. Tyrosine kinase inhibitors (TKI) such as erlotinib are efficient in treating NSCLC but the emergence of chemoresistance and adverse effects substantially limits their single use. Objective: in this study, the combination treatments of either 2-deoxy-D-glucose (2DG) or cinnamic acid (CINN) with erlotinib (ERL) were tested for their possible synergistic effect on the proliferation and migration capacity of NSCLC cells. Methods: In this study, NSCLC model cell line A549 was used to investigate the effects of single compounds and their combination on cell gro
... Show MoreAbstract—Background: Polycystic ovary syndrome (PCOS) is a prevalent hormonal disorder affecting reproductive- age women, often linked to metabolic issues like insulin resistance. Objective: this study aimed to evaluate ornithine decarboxylase (ODC) and ferric reducing capacity (FRC) levels in women with PCOS, with assess the effects of metformin and Primolut N treatment on their levels. Subjects and Methods: A case− control study was conducted with 150 married Iraqi women, categorized into three groups: 50 healthy controls, 50 untreated PCOS, 50 treated PCOS. Blood samples were analyzed for ODC, FRC levels and hormonal profiles. Statistical analysis applied independent t-test, Pearson’s correlation, ROC curve. Results: The ODC level
... Show More