Background: To elucidate the possible role of human cytomegalovirus in pregnancy loss through induction of certain pro-inflammatory adhesion molecules.
Methods: Paraffin embedded sections of curate samples were obtained from 34 women had spontaneous abortion, and 5 women had elective termination of pregnancy (as control), and then subjected for immunohistochemistry analysis to detect human cytomegalovirus (HCMV) early protein and VCAM-1 molecule.
Results: Nine out of 34 women with spontaneous abortion were positive for HCMV early protein, with a
significantly higher expression of VCAM-1 in HCMV positive cases as compared with HCMV negative and the control groups (p = 0.05, 0.001 respectively).
Conclusion: HCMV infection may p
Abstract We have been studied and analysis the electronic current at the interfaces of Au/PTCDA system according to simple quantum mode for the electronics transition rate due to postulate quantum theory. Calculation of electronic current were performed at interface of Au/PTCDA as well as for investigation the feature of electronic density at this devices. The transition of electronic current study under assume the electronic state of Au and PTCDA were continuum and the states of electrons must be closed to energy level for Au at Fermi state, and the potential at interface feature depended on structure of Au and PTCDA material. The electronic transition current feature was dependent on the driving force energy that results of absorption ene
... Show MoreThe limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show MoreThis study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be comp
... Show MoreThe aim of the research is to determine the requirements for developing the technical capabilities of the agricultural extension service providers to face the effects of climatic changes in Baghdad Governorate, to achieve the goal of the research and in order to obtain the respondents’ approval of the requirements (28) requirements were identified in the light of the literature and studies related to the subject and the opinions of specialists to develop the technical capabilities of the agricultural extension service providers distributed on two axes (the ability to know the effects of climate changes, the ability to know the practices to reduce the effects of climate changes). The
This paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis