During recent years, there has been an increasing interest in the investigation of the cytokines roles in pathogenesis of cancer, thus the study aimed at evaluating the level of tumor necrosis factor-alpha(TNF-?) in sera of Iraqi multiple myeloma (MM) patients. Beta 2-microglobulion (?2-m) was assessed to determine if there was any association between this cytokine and the level of ?2- m, as the latter is related to the stage of the disease. In addition, the age and gender were also taken into consideration. Furthermore, we investigated the relationship between IgG and TNF-? in sera of patients. 49 Iraqi patients (27 males and 22 females).The patients were also divided into two groups: the first group included (17) patients who were
... Show MoreThis paper presents a hybrid energy resources (HER) system consisting of solar PV, storage, and utility grid. It is a challenge in real time to extract maximum power point (MPP) from the PV solar under variations of the irradiance strength. This work addresses challenges in identifying global MPP, dynamic algorithm behavior, tracking speed, adaptability to changing conditions, and accuracy. Shallow Neural Networks using the deep learning NARMA-L2 controller have been proposed. It is modeled to predict the reference voltage under different irradiance. The dynamic PV solar and nonlinearity have been trained to track the maximum power drawn from the PV solar systems in real time.
Moreover, the proposed controller i
... Show Moreحسن السيد عز الدين بحر العلوم العقد الاجتماعي والسلطة الشعبية عند الإمام علي (عليه السلام )
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreAZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
Naproxen is non-steroidal anti-inflammatory drug, which has antipyretic and anti-inflammatory effect. It is extensively bound to plasma albumin, and exhibits gastric toxicity, so it may be more efficient to deliver the drug in its sustained release dosage form and adequate blood level is achieved. Three liquid formulations with in situ gelling properties have been assessed for their potential for the oral sustained delivery of naproxen . The formulations were dilute solutions of: (a) pectin; (b) gellan gum and; (c) sodium alginate, all containing complexed calcium ion that form gels when these ions are released in the acidic environment of the stomach . The viscosity of the sols and drug release were measured, and was found to be depende
... Show MoreUse of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic
... Show More There is an increase in the need for cost accounting in all organizations and from different sectors to provide detailed information to the totals of financial accounting, first and help solve problems associated with inventory and analysis, tabulation and allocation of cost elements II and do the planning process and provide the necessary oversight and help to take the right decisions such as pricing decisions that need to Information cost accounting.
And suffer most of the non-governmental organizations from the lack of a cost accounting system provides information on the cost of service in these organizations and the department research sample circle v
Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show More