As many expensive and invasive procedures are used for the diagnosis or follow-up of clinical conditions, the measurement of cell-free DNA is a promising, noninvasive method, which considers using blood, follicular fluid, or seminal fluid. This method is used to determine chromosomal abnormalities, genetic disorders, and indicators of some diseases such as polycystic ovary syndrome, pre-eclampsia, and some malignancies. Cell-free DNA, which are DNA fragments outside the nucleus, originates from an apoptotic process. However, to be used as a marker for the previously mentioned diseases is still under investigation. We discuss some aspects of using cell-free DNA measurements as an indicator or marker for pathological conditions.
Nowadays, energy demand continuously rises while energy stocks are dwindling. Using current resources more effectively is crucial for the world. A wide method to effectively utilize energy is to generate electricity using thermal gas turbines (GT). One of the most important problems that gas turbines suffer from is high ambient air temperature especially in summer. The current paper details the effects of ambient conditions on the performance of a gas turbine through energy audits taking into account the influence of ambient conditions on the specific heat capacity ( , isentropic exponent ( ) as well as the gas constant of air . A computer program was developed to examine the operation of a power plant at various ambient temperature
... Show More
Idiomatic expressions in Russian journalism make one important borrowed means for making a dialogue with the receiver's intellect in so far as it has the distinct feature of having clarity and exactness of meaning. The meaning is seen as a shortcut for covering a series of concepts and details so as to arrive at the intended meaning. This is done by stimulating the reader by the use of certain clear idioms. The use of such idioms in a journalistic text is not for a linguistic purpose only, but it is a cultural and social phenomenon reflecting the type of current changes in the society and it aims at discoursing with the reader's mind. This paper is a practi
... Show MoreThis study investigated the structural behavior of a beam–slab member fabricated using a steel C-Purlins beam carrying a profile steel sheet slab covered by a dry board sheet filled with recycled aggregate concrete, called a CBPDS member. This concept was developed to reduce the cost and self-weight of the composite beam–slab system; it replaces the hot-rolled steel I-beam with a steel C-Purlins section, which is easier to fabricate and weighs less. For this purpose, six full-scale CBPDS specimens were tested under four-point static bending. This study investigated the effect of using double C-Purlins beams face-to-face as connected or separated sections and the effect of using concrete material that contains different recycled
... Show MoreThis study evaluated the structural changes of enamel treated by the Regenerate system and carbon dioxide (CO2) laser against acid challenge. Thirty human enamel slabs were prepared and assigned into three groups: Group I: untreated (control); Group II: treated with the Regenerate system; and Group III exposed to CO2 laser. All specimens were subjected to an acid challenge (pH 4.5–7.0) for 14 days. Specimens were evaluated and compared at 120 points using five Raman microspectroscopic peaks; the phosphate vibrations ν1, ν2, ν3, and ν4 at 960, 433, 1029, and 579 cm−1, respectively, and the carbonate at 1070 cm−1, followed by Vickers microhardness test. The ratio of carbonate to phosphate was correlated to the equivalent mic
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThis study reports the formation, characterisation and biological evaluation of a Schiff base ligand and its corresponding metal complexes. The Schiff base ligand (HL) was prepared through a condensation reaction involving isonicotinohydrazide and N'-((1R,2R,4R,5S, E)-2,4-bis(4-chlorophenyl)-3-azabi cyclo[3.3.1]nonan-9-ylidene) isonicotinohydrazide (M) in EtOH solvent and (3-5) drops of conc. HCl. The interaction of HL with selected metal chlorides including Mn(+2), Co(+2), Ni(+2), Cu(+2) and Zn(+2) in a 2:1 (L:M) mole ratio resulted in the synthesis of complexes with the general formula [M(HL)Cl2] (where: M = Mn(+2),Co(+2) and Ni(+2)) and [M`(HL)Cl2] (where M` = Cu(+2) and Zn(+2)). The characterisation of the prepared compounds w
... Show More