A simplified parallel key was presented in this work for the Taxa of Stackys L. wildly grown in Iraq. Three records within this genus were newly recorded to our country in the present work and they are S. kermanshahansis Rech S. setifera C.A. Mey. subsp setifera, S. setifera ssp iranica (Reck.) The characteristics of these new records were also given with some representative specimens.
Leishmaniasis is a widespread parasitic disease caused by Leishmania parasite, this disease considers a major health problem among worldwide. Treatments available are expensive or with cytotoxic side effect. This study was aimed to investigate the effect of an herbal new compound, called artemisinin, derived from a Chinese plant called Artemisia annua. Various concentrations were studied in vitro against L. tropica amastigotes by chamber counting to investigate its effect on the proliferation of promastigotes. Three incubation periods were adopted (24, 48, 72) hours. The results showed a significant decrease in surviving promastigotes, in parallel with the normal parasite count of untreated promastigotes, along the periods studied. Th
... Show MoreLeishmaniasis is a widespread parasitic disease caused by Leishmania parasite, this disease considers a major health problem among worldwide. Treatments available are expensive or with cytotoxic side effect. This study was aimed to investigate the effect of an herbal new compound, called artemisinin, derived from a Chinese plant called Artemisia annua. Various concentrations were studied in vitro against L. tropica amastigotes by chamber counting to investigate its effect on the proliferation of promastigotes. Three incubation periods were adopted (24, 48, 72) hours. The results showed a significant decrease in surviving promastigotes, in parallel with the normal parasite count of untreated promastigotes, along the periods studied. This stu
... Show MoreBackground: ;Hepatitis C virus (HCV) is a major cause of chronic liver disease. Approximately 85% of patients acutely infected with HCV progress to chronic liver disease with persistence of HCV-RNA for more than 6 months Among patients with chronic HCV infection , 15-20% progress to end-stage liver disease main transmission methods of the virus is by : blood and blood products ; sharing needles and acupuncture .Objective: To evaluate Iraqi patients infected with chronic HCV, including their treatment, and factors that affect their response to treatment .Methods :This study was performed at Gastroenterology and Hepatology hospital in Baghdad from January 2011 to March 2012.The study enrolled 90 patients with HCV Antibody positive (Ab +ve)
... Show MoreBackground: Rituximab is a chimeric IgG1 kappa immunoglobulin that has been genetically modified to incorporate human constant region sequences together with murine light- and heavy-chain variable region sequences. People use it to treat rheumatoid arthritis and certain malignancies. Objective: The study aimed to assess the potential association between the serum levels of Factor I, CD59, interleukins (IL)-6, and interferon-gamma (IFN)-γ and the response to Rituximab treatment in Iraqi rheumatoid arthritis patients. Methods: A cross-sectional study was conducted at the rheumatology center at Baghdad Teaching Hospital. Ninety adult patients who have been diagnosed with rheumatoid arthritis and are receiving Rituximab intravenous i
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreNew vision of Mr. Abdul Mahdi Al-Muttafiqi in the light of unpublished documents
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More