Preferred Language
Articles
/
yhZVHYoBVTCNdQwC8pCy
Extracellular Histones Inhibit Complement Activation through Interacting with Complement Component 4
...Show More Authors
Abstract<p>Complement activation leads to membrane attack complex formation, which can lyse not only pathogens but also host cells. Histones can be released from the lysed or damaged cells and serve as a major type of damage-associated molecular pattern, but their effects on the complement system are not clear. In this study, we pulled down two major proteins from human serum using histone-conjugated beads: one was C-reactive protein and the other was C4, as identified by mass spectrometry. In surface plasmon resonance analysis, histone H3 and H4 showed stronger binding to C4 than other histones, with KD around 1 nM. The interaction did not affect C4 cleavage to C4a and C4b. Because histones bind to C4b, a component of C3 and C5 convertases, their activities were significantly inhibited in the presence of histones. Although it is not clear whether the inhibition was achieved through blocking C3 and C5 convertase assembly or just through reducing their activity, the outcome was that both classical and mannose-binding lectin pathways were dramatically inhibited. Using a high concentration of C4 protein, histone-suppressed complement activity could not be fully restored, indicating C4 is not the only target of histones in those pathways. In contrast, the alternative pathway was almost spared, but the overall complement activity activated by zymosan was inhibited by histones. Therefore, we believe that histones inhibiting complement activation is a natural feedback mechanism to prevent the excessive injury of host cells.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Geotechnical Engineering And Sustainable Construction
Regulation of Supplier Standards in Iraq: Through Sustainability Standards
...Show More Authors

View Publication
Crossref
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Educational values when Imam Shafie i through his hair
...Show More Authors

In this research was the study of the educational values ​​when Shafei, contained in hair Shafi'i, and that what the role of these values ​​in the education of generations, and the possibility of their application in the educational curriculum. Find addressed Shafei life and his time. The values ​​derived from his hair, as well as quoting from the Koran and influenced by it, which is evident in the hair, governance and eating Alomthal.okzlk Find the importance of this thought in modern education, so as to realism and ease of application. It is the search results, the Shafi'i put thought educationally integral based on the Koran rise to the level of theory. Find and conclusions: that education in its present situation

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Mining Deviations in Document Writing Style through Vector Dissimilarity
...Show More Authors

     Doubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent.      The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average  weight of their word  are constructed. Second, the degree of cl

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Developing the investment budgeting through evaluation of investment projects
...Show More Authors

The aim of the research is to determine the impact of evaluating the investment projects in the development and preparation of investment budgets prepared by the economic units, since the investment projects are of an important and vital nature of the economic units, because these projects include the length of time for preparation and implementation and the accompanying period of this risk and uncertainties as well as need To the many funds to complete the project , The process of evaluating the implemented projects, which have been prepared an investment budget previously will contribute to the extent of matching the estimated data with the actual results or deviations, which is a step to avoid these errors in future p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of multiple sources of funding on the disclosure of cash flow and the activation of control procedures
...Show More Authors

The principle of an interview requires revenues to expenditures by linking the efforts and achievements and disclosure sufficient to result activity, in the case generate future benefits of a particular asset, this asset appears in the balance sheet to reflect with the rest of the accounting unit's assets on the strength of financial position In the absence of future benefits from the effort are so loaded effort on the result accounts that reflect the outcome of activity during a specific period if the month or be separated or fiscal year. 

The researcher reached the following conclusions:

 1- difficult to control the cash inflows and outflows as a result of the multiplicity of sources of funding.

2- wea

... Show More
View Publication
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Organization Structure as Component of Quality Improvement for Maternal and Child Health Promotion in Baghdad City’s Primary Health Care Centers
...Show More Authors

A descriptive evaluation study is conducted on primary health care centers in Baghdad City in order to
evaluate the organization structure as component of quality improvement of maternal and child health promotion
from April 10th 2012 to May20th 2013. A total of (22) primary health care centers. Study instrument was
comprised of three questionnaires and overall items included in these questionnaire were (65) items. Data are
collected through the utilization of the developed questionnaire and the interview technique as means of data
collection. Data are analyzed through the application of descriptive statistical data analysis methods which
includes the measurement of the frequencies, percentages, and computation of mean

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 19 2024
Journal Name
Chemical Papers
In vitro and in silico evaluation of 4'-hydroxy-[1,1'-biphenyl]-4-carbohydrazide Schiff base and oxadiazole derivatives targeting EGFR allosteric site
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis, Characterization and Spectral Studies of Y(III), La(II) and Rh(III) Complexes with 2,4-dimethyl-6-(4-nitro-phenylazo)Phenol .
...Show More Authors

Transition metal complexes of Y(III), La(III) and Rh(III) with azo dye 2,4-dimethyl-6(4-nitro-phenylazo)-phenol derived from 4-nitroaniline and 2,4-dimethylphenol were synthesized. Characterization of these compounds has been done on the basis of elemental analysis, electronic data, FT-IR,UV-Vis and 1HNMR, as well as conductivity measurements. The nature of the complexes formed were studies following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range (1x10-4- 3x10-4). High molar absorbtivity of the complex solutions were observed. From the analytical data, the stoichiomerty of the complexes has been found to be 1:3 (Metal:ligand). On the basis of Physicochemical data octahedral geometries were a

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
P J M H S
Synthesis and Spectro Scopic Study of Some Metal Transition Amino Organic Compounds with N-(2-OXO-1,2-Dihydropyrimidin-4- Ylcarbamothioyl) Acetamide (DPA)
...Show More Authors

A New ligand, N-(2-oxo-1,2- Dihydropyrimidin-4- ylcarbamothioyl) Acetamide (DPA) was prepared by reaction of iso thiosyanate derivative with Cytosine. The ligand has been characterized through elemental analysis, H1 NMR, C13NMR, FT-IR, and UV Visible spectra, such ligand’s transition metal complexes have been characterized through conductivity measurement, FT-IR, UV Visible spectra and magnetic susceptibility, all the complexes of this ligand are solid crystal and molar ratio (2:1) (ligand: metal). The form of molecular for these complexes octa hedral. The general formula [M(DPA)2Cl2], where M+2 = (Mn, Co, Ni, Cu, Zn, Cd, Hg).