Preferred Language
Articles
/
jih-2017
Comparative Study of Thymidine Kinase -1 and Total Antioxidant Capacity in Iraqi Children with Platelet Count Disorder

        This study aimed to find relationship between thymidine kinase-1 (TK-1) as tumor marker and total antioxidant capacity (TAC) in Iraqi children patients with thrombocytopenia and with thrombocytosis. The present study conducted 60 children patients (30 patients with idiopathic thrombocytopenia purpura (ITP) and 30 patients with thrombocytosis caused by leukemia) attending the Children Fever Hospital in the Medical City / Baghdad, and 30 healthy children as a control group. All study groups were with range ages (1-15) years, and they were diagnosed by assay of platelet count, Prothrombin Time   (PT), and partial Thromboplastin Time (PTT). The results shown elevation  in plasma TK-1 and TAC values in children patients with thrombocytopenia and with thrombocytosis when compared with control group, and there was no significant different in TK-1 level and a significant different in TAC level in two patients groups. There were a highly significant positive correlation between TK-1 and TAC levels in both Iraqi children patients with thrombocytopenia and with thrombocytosis. The current study concluded that TK-1 may be a novel biomarker for platelet count disorder disease and there was a probability of expose these patients for tumor diseases.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Study of the hadeeth saying "peace be upon him" ("Allaah is enough for me to solve your harams, and sing me for your goodness")

I dealt with this study of one of the hadiths of the Prophet and judged him after studying his deed, especially one of his narrations for the similarity in his name and the name of his father (Abdul Rahman bin Ishaq) Is he a civil "Sadok" or Wasti "weak" and they are in one layer which is called in the science of Hadith (agreed And after a review of Kutkut translations and wound and amendment and other evidence and evidence that it was "weak" and not as he went to him and asserted by the updated Muhammad Nasser al-Din al-Albani may God have mercy on him that in Sindh is a civil rule for the hadeeth "Hassan" and not as said The hadeeth is “weak” because he showed that it is the weak Wasti.
I ask God to be successful in this work an

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Study the Chemical Bonding of Heterometallic Trinuclear Cluster Containing Cobalt and Ruthenium: [(Cp*Co) (CpRu)2 (μ3-H) (μ-H)3] using QTAIM Approach

 

The topological parameters of the metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp*Co) (CpRu)2 (μ3-H) (μ-H)3]1 (Cp* = η5 -C5Me4Et), (Cp = η5 -C5Me5), was explored by using the Quantum Theory of Atoms-in-Molecules (QTAIM). The properties of bond critical points such as the bond delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density ∇2ρ(r), the local energy density H(r), the local potential energy density V(r) and ellipticity ε(r) are compared with data from earlier organometallic system studies. A comparison of the topological processes of different atom-atom interactions has become possible than

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The semiotic of the Islamic blazon - a related analytical study between the Islamic blazon and its publicity message: رغده بنت فيصل بن خضر الدعواني

This study discusses the semiotic of the Islamic blazon - a related analytical study between the Islamic blazon and its visual publicity message. The aim of the current study is to explore the related relationship between the Islamic blazon and its visual publicity message. The sample is contained Five of Islamic blazon in the Mamelukes period which is between 1250 to 1517. The methodology is descriptive-analytical, and the result is that there is a clear relation between the Islamic blazon with its visual publicity message. This study's recommendation is to go towards analyzing the meanings of the cultural legacies of the Islamic civilization, and researching the implicit meanings accompanying these features leads to a deeper understand

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Engineering
Publication Date
Wed May 30 2018
Journal Name
International Journal Of Computer Networks & Communications
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Wed Jul 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Crossref (4)
Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Strongly (E,F)-convexity with applications to optimization problems

In this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex. 

Crossref (1)
Crossref
View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Feb 27 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
SUGGESTING MULTIPHASE REGRESSION MODEL ESTIMATION WITH SOME THRESHOLD POINT

The estimation of the regular regression model requires several assumptions to be satisfied such as "linearity". One problem occurs by partitioning the regression curve into two (or more) parts and then joining them by threshold point(s). This situation is regarded as a linearity violation of regression. Therefore, the multiphase regression model is received increasing attention as an alternative approach which describes the changing of the behavior of the phenomenon through threshold point estimation. Maximum likelihood estimator "MLE" has been used in both model and threshold point estimations. However, MLE is not resistant against violations such as outliers' existence or in case of the heavy-tailed error distribution. The main goal of t

... Show More
Crossref (1)
Crossref
View Publication Preview PDF