Background: Refractory/relapsed acute leukemia has always been a challenging problem for hematologist. Over the past decade emphasis has been made in the development of regimens containing fludarabine, combined with cytosine arabinoside for the treatment of refractory/relapsed acute leukemias. The aim of this study is to evaluate the efficacy and toxicity of the combination of fludarabine, high dose cytarabine, and granulocyte colony stimulating factor in refractory relapsed cases of acute leukaemia,
Methods: a prospective study is being conducted at the national center of hematology and hematology unit /Baghdad teaching hospital from July 2008 to July 2010.Twenty Patients with refractory/relapsed acute leukemia were treated with fludarabine 30mg/m2 and cytosine arabinoside (AraC) 2 g/m2 for 5 days, and granulocyte colony stimulating factor G-CSF 300 microgram/day from day 0 till neutrophil recovery (ANC >1.0 x 109/l).Response was evaluated by bone marrow examination on day 30-post chemotherapy.
Results: Patients included were refractory acute lymphoblastic leukemia (ALL) (n=5), relapsed ALL (n=4), refractory acute myeloid leukemia (AML) (n=8), relapsed AML (n=3). Complete remission (CR) was achieved in 9(45%) patients, 3 (15%) patients got partial remission. Three (15%) patients died of post chemotherapy complications and 5(25%) patient failed to achieve remission. Major complications encountered were: anemia, fever, bleeding, mucositis and bacterial infections.
Conclusion: FLAG protocol is well tolerated and effective regimen in relapsed / refractory acute leukemias. The toxicity is acceptable, enabling most patients to receive further treatment, including transplantation procedures
Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreBackground: Poly cystic ovary syndrome is a common disorder in women of reproductive age, it is associated with disturbance of reproductive, endocrine and metabolic functions. The pathophysiology of PCOS appears to be multifactorial and polygenic. Leptin seems to play an important role in pathophysiology of PCOS especially in women with BMI ≥25kg/m2. Objectives: To assess leptin level in both PCOS and healthy women and explore the relation to their body weight and body mass index. Patient and Methods: A total of 120 women were enrolled in this study, 60 women (50%) had PCOS (study group) and the reminder 60 women (50%) were healthy women and considered as control group. BMI was calculated first. Both groups were further sub
... Show MoreVisceral leishmaniosis is one of the most fatal old-world neglected disease with estimated 90 thousand worldwide cases emerge each year. In Iraq, the cutaneous and visceral form are endemic but available chemotherapies are either toxic with diverse side effects, expensive available drugs or parasite …
Based on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation. Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.
It is known that language learners face multiple difficulties in writing and creating an inte
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More