This study aimed to find relationship between thymidine kinase-1 (TK-1) as tumor marker and total antioxidant capacity (TAC) in Iraqi children patients with thrombocytopenia and with thrombocytosis. The present study conducted 60 children patients (30 patients with idiopathic thrombocytopenia purpura (ITP) and 30 patients with thrombocytosis caused by leukemia) attending the Children Fever Hospital in the Medical City / Baghdad, and 30 healthy children as a control group. All study groups were with range ages (1-15) years, and they were diagnosed by assay of platelet count, Prothrombin Time (PT), and partial Thromboplastin Time (PTT). The results shown elevation in plasma TK-1 and TAC values in children patients with thrombocytopenia and with thrombocytosis when compared with control group, and there was no significant different in TK-1 level and a significant different in TAC level in two patient’s groups. There was a highly significant positive correlation between TK-1 and TAC levels in both Iraqi children patients with thrombocytopenia and with thrombocytosis. The current study concluded that TK-1 may be a novel biomarker for platelet count disorder disease and there was a probability of expose these patients for tumor diseases.
Thermal performance of closed wet cooling tower has been investigated experimentally and theoretically
in this work. The theoretical model based on heat and mass transfer equations and heat and mass transfer balance equations which are established for steady state case. A new small indirect cooling tower was used for conducting experiments. The cooling capacity of cooling tower is 1 kW for an inlet water temperature of 38oC, a water mass velocity 2.3 kg/m2.s and an air wet bulb temperature of 26oC. This study investigates the relationship between saturation efficiency, cooling capacity and coefficient of performance of closed wet cooling tower versus different operating parameters such wet-bulb temperature, variable air-spray water fl
Investigation of mesomorphic properties of new 1,3,4-thiadiazolines (which are synthesised via many steps in Scheme 1) was carried out in this study. These compounds are designed to have a heterocyclic unit, a carboxylate linkage group and a polar ether chain at the end of the molecule adjacent to the benzene ring, which enhance the dipolar interactions forces (varied from one to eight carbons) to investigate the association properties of their phases. The structure of the target compounds and the intermediates were confirmed by 1H NMR, 13C NMR, mass and FTIR spectral techniques. Polarised microscopic studies revealed that all the compounds in the series exhibited enantiotropic liquid crystalline properties. This was further confirmed using
... Show MorePrimary amide derivatives as histone deacetylase inhibitors (HDACIs) are very rare. This paper describes the synthesis of primary amide derivatives (compounds 6 and 7) that have the requirements to be histone deacetylase inhibitors of the zinc-binding type. Both of them exhibited good cytotoxicity against the tested cancer cell lines with much lower cytotoxicity against normal cell line.
In spite of the foundation of Iraqi state in 1921 and the formation of the new features of
the modern state, however, the inherited costumes and traditions sustained in the conservative
society. But due to the development that inflicted to the Iraqi society and the development of
the staff in all fields and requirement conducting to female learning. After WW II and the
1950s, women get out of their houses to seek learning by approaching the doors.
What is positive about that phase was the formation of the College of Queen A'liya
which is regarded as a positive indicator. In any case the Iraqi family encouraged women to
be indulged in higher education. Calling the college Queen A'liya
The current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreThe tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).
The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?
The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the
... Show More
In the name of God, praise be to God, and prayers and peace be upon the best of God’s creation, Muhammad bin Abdullah, and upon his family and companions, and from his family:
And after:
He saw from verbs that transcend one effect if it is visual and to two effects if it is heart and this action has several strokes and it is an awareness of the sense and illusion and imagination and reason and in addition to that it has many meanings dealt with in the glossary books and as for what the verb included in the audio studies it is the explanation and deletion and slurring The heart of my place. As for what the grammatical studies included, it focuses on one or two effects according to its l
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show More
