Biological Activity of Complexes of Some Amino Acid
The provision of safe water for people is a human right; historically, a major number of people depend on groundwater as a source of water for their needs, such as agricultural, industrial or human activities. Water resources have recently been affected by organic and/or inorganic contaminants as a result of population growth and increased anthropogenic activity, soil leaching and pollution. Water resource remediation has become a serious environmental concern, since it has a direct impact on many aspects of people’s lives. For decades, the pump-and-treat method has been considered the predominant treatment process for the remediation of contaminated groundwater with organic and inorganic contaminants. On the other side, this tech
... Show MoreThe main process, for the elimination of cholesterol from the human body, involves the alteration of cholesterol into bile acid (BA), by the liver. The farnesoid X receptor (FXR), a member of the nuclear receptor superfamily, is essential for the regulation of BA, glucose, and lipid metabolism. It is largely found in the liver, intestines, kidney, and adrenal glands, and to a smaller degree in the heart and adipose tissue. The binding locations, of the FXR, are in close proximity to formerly undisclosed target genes, with distinctive activities associated with transcriptional regulators, autophagy, apoptosis, hypoxia, inflammation, RNA processing, and a number of cellular signaling pathways. The preservation of BA homeostasis, by the FXR, e
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreNegotiations are distinguished in that they are an easy and simple means between the conflicting parties, and it is an effective means at the same time as the conflicting parties seek understanding on the most effective way to solve their dispute, but negotiations are not always appropriate to resolve international disputes, especially when there is a disparity in power between the negotiating countries, or when it is missing Goodwill, or even when one of the parties is absent or less flexible, and the internal circumstances of one of the conflicting countries may play a negative or positive role in the success of the negotiations, away from the influence of the role of external variables in that, a
... Show MoreThis study included the Zakhikhah area in the Al- Anbar desert, which it bounded on the north, east, and west by the Euphrates River and on the south by the Ramadi-Qaim road. Several exploratory field trips were taken to the study area. During this time, a semi-detailed area survey was carried out based on satellite imagery captured by American Land sat-7, topographic maps, and natural vegetation variance. All necessary field tools, including a digital camera and GPS device, were brought to determine the soil type and collect plant samples. All of these visits are planned to cover the entire state of Zakhikhah. All vegetation cover observations, identifying sampling sites and attempting to inventory and collect medicinal plants in t
... Show MoreThe researcher used the experimental approach due to its suitability and the nature of the research problem. The research community was represented by the eighth-grade students in the Rozak Elementary Mixed School affiliated with the General Directorate of Education in Erbil / the center, for the academic year (2021-2022), the number is (96) students, and the research sample consisted of (63) male and female students, with (31) in the experimental group, and (32) in the control group, and (11) students were excluded by (5) students from the experimental group, and (6) students from the control group, as the excluded, are students who failed and were absent from the lessons, and accordingly, the research sample became composed of (52) mal
... Show More