Preferred Language
Articles
/
wRYj1YgBVTCNdQwCToIP
Green tea influence on iron overload in thalassemia intermedia patients: a randomized controlled trial
...Show More Authors

Background: Although iron chelation therapies have been available for many years for thalassemia intermedia patients, iron accumulation remains the major cause of death. Therefore, the need for additional chelation options is in demand. This randomized controlled study aimed to understand the effects of green tea on iron balance in thalassemia intermedia patients.

Methods: Using a random selection method, 141 thalassemia intermedia patients were initially screened for inclusion in this trial; only 68 patients included after applying exclusion criteria. Two equal groups were generated (n=34/group): green tea (three cups/day after meals) + usual treatment (deferasirox iron chelator and on demand blood transfusion); and control (only usual treatment). The study lasted for a period of 12 months. Patients failing to comply to the trial methodology were excluded, leaving a final total of 29 patients in the green tea group and 28 patients in the control group. Liver iron concentration, and serum ferritin were assessed at baseline and 12 months, while hemoglobin levels were assessed monthly.

Results: At baseline, both groups were matched regarding general demographics. At 12 months, the net drop of liver iron concentration in the green tea group (7.3 mg Fe/g dry weight) was significantly higher than the control group (4.6 mg Fe/g dry weight) (p<0.05). This was also seen with serum ferritin; net reduction in green tea and control groups were 1289 ng/ml and 871 ng/ml, respectively (p<0.05). Hemoglobin levels were slightly higher in the green tea group compared with the control group, but this was not significant.

Conclusions: Regular green tea consumption had a significant capability to improve iron deposition in thalassemia intermedia patients who already undergo deferesirox iron chelation therapy.

Trial registration: UMIN-CTR Clinical Trials Registry, UMIN000040841 (retrospectively registered June 21, 2020).

Scopus Crossref
View Publication
Publication Date
Wed Jul 01 2015
Journal Name
Political Sciences Journal
The concept of ethnicity in contemporary American political thought Jerry Mueller, a model ...
...Show More Authors

الخلاصة

تشير نظريات علم اجتماع المعرفة الى ان ظهور مفهوم معين او سقوطه لايتم بمحض الصدفة، بل نتيجة تفاعل مجموعة من العوامل الثقافية والسياسية وحتى الاقتصادية ومن هنا فأن ظهور مفهوم الاثنية كان محصلة عوامل كثيرة خصوصاً بعد ان اصبح موضوع الاثنية في العقود الاخيرة من القرن الماضي وبداية القرن الواحد والعشرين محور نقاش رئيس في ميدان البحث الاجتماعي والسياسي، ليس في

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Social Medical Care for the Deformed Children: A Field Study in Baghdad City
...Show More Authors

The Child is the first sedum for the human society performing, and we deal in our
research to explain the nature of the mutual relations in between the form and the medicine
social caring foundation. So the motherhood and the childhood nowadays become the most
dedicated in the researchers works, whom interesting in the social affairs, and that whom
work in the medicine field as scientists.
So the child is the future man and must be in wright body construction that need to great
care and interest to make him wright mind through capability of performing anything support
to him.
In our research we deal with the main factors in which lead to infect the child by the
creative malfunction, like the environmental and m

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
the indication of the scene as a symbolic system in the Iraqi theatrical
...Show More Authors

The theatrical view reflects various connotations and intellectual and aesthetic implications, as the view includes a symbolic geometric, architectural and archetypal connotation suggestive of reality and nature, as theatrical art is the woman that reflects reality, specifically the significance of the theatrical view that reveals to us the philosophical, aesthetic and cognitive dimensions of theatrical trends, so the research came with the methodological framework, which It included the research problem (what is the significance of the scene as a symbolic system in the Iraqi theatrical performance), the importance of the research and the need for it, the research objective, the limits of the research and the most important terms.
A

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
A Pragmatic Analysis of the Use of Intensifiers in Charles Dickens’ Hard Times
...Show More Authors

The present study investigates the use of intensifiers as linguisticdevices employed by Charles Dickens in Hard Times. For ease of analysis, the data are obtained by a rigorous observation of spontaneously occurring intensifiers in the text. The study aims at exploring the pragmatic functions and aesthetic impact of using intensifiers in Hard Times.The current study is mainly descriptive analytical and is based on analyzing and interpreting the use of intensifiers in terms ofHolmes (1984) andCacchiani’smodel (2009). From the findings, the novelist overuses intensifiers to the extent that 280 intensifiers are used in the text. These intensifiers(218) are undistinguished

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Style ''Affirmative say'' in the holy Quran Ibn Ashour's interpretation is a model
...Show More Authors

Abstract

This study talks about a wonderful Qur'anic style. relates to one of the methods used in it. And it's the rhetorical style:  ''Affirmative say''. It is useful in arguing with the opponent, nullifying his reasoning, and proving the opposite meaning of the opponent. The study will be conducted from a Qur'anic perspective based on the study of examples of it, and partly in interpretive treatment through the book of editing and enlightenment of Taher Ibn Ashour, known for his art in matters of rhetoric and methods of controversy. This is with the rooting of this issue, and the relationship of industrial sciences to it as a Qur'anic style.

Keywords: ''Affirmative say, style, Qur'anic rhetoric, Arabic rhetoric, Co

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
The Greatness of God in Creating the Hoopoe Bird - A Miracle Study - Explanatory
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon the best of the messengers, Muhammad, and all his family and companions. And after:
For when I had the pleasure of looking at the chapters of the Noble Qur’an, and its evident signs, my view fell on one of its brightest verses, and it is the Almighty saying: ﭽﯜ ﯝ ﯞ ﯟ ﯠ ﯡ ﯢ ﯣ ﯤ ﯥ ﯦ ﯧ ﯨﭼ (). The tag: (God’s Greatness in Creating a Hoopoe). The research methodology required that I divide it into four sections:
The first topic: an overview of birds.
The second topic: the characteristics and characteristics of hoopoe.
The third topic: the logic of the bird.
The fourth topic: Praise the bird.
This has relied in my research on

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Some Lean Production Tools in selecting a Mass Customization Strategy
...Show More Authors

   The research aims to indicate the relationship between lean production tools included seven {constant improvement , and Just in time (JIT), and the production smoothing , and quality at the source, and standardized work, Visual management, and activities 5S }  and  Mass Customization strategy for the model (Pine & Gilomer, 1997) {collaborative, adaptive, cosmetic, transparent}, as well as providing a conceptual framework and applied for variables search to clarify how they will choose a Mass Customization strategy through the lean production tools, , and recognize the reality of the practices of Iraqi industries in such a field. Moreover, aims to highlight the positive aspects that accrue to companies a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
One and Two-Dimensional Hydraulic Simulation of a Reach in Al-Gharraf River
...Show More Authors

       

One and two-dimensional hydraulic models simulations are important to specify the hydraulic characteristics of unsteady flow in Al-Gharraf River in order to define the locations that facing problems and suggesting the necessary treatments. The reach in the present study is 58200m long and lies between Kut and Hai Cities. Both numerical models were simulated using HEC-RAS software, 5.0.4, with flow rates ranging from 100 to 350 m3/s. Multi-scenarios of gates openings of Hai Regulator were applied. While the openings of Al-Gharraf Head Regulator were ranged between 60cm to fully opened. The suitable manning roughness for the unsteady state was

... Show More
View Publication Preview PDF
Crossref (8)
Crossref