
BACKGROUND: Hepatocyte growth factor (HGF) is a proangiogenic factor that exerts different effects over stem cell survival growth, apoptosis, and adhesion. Its impact on leukemogenesis has been established by many studies. AIM: This study aimed to determine the effect of plasma HGF activity on acute myeloid leukemia (AML) patients at presentation and after remission. PATIENTS AND METHODS: This was a cross-sectional prospective study of 30 newly-diagnosed, adult, and AML patients. All patients received the 7+3 treatment protocol. Patients’ clinical data were taken at presentation, and patients were followed up for 6 months to evaluate the clinical status. Plasma HGF levels were estimated by ELISA based methods in the pa
... Show MoreThis research has been devoted to the objective and important issue which is the legal protection of the printing form of the newspaper in the Iraqi press.
As this issue constitutes the integrated unit of the printing format in addition to achieving legal protection for the illustrative image used in the press. Such matter, on both level the integrated unit of the printing format and the legal protection, is out of reach of study due to the comprehension of the subject is concerned.
Although there is a justification for dealing with both of them together as the explanatory image is one of the foundations on which the printing format of the newspaper is built. This case generates, at least, the same legal subject that appe
... Show MoreINFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM CV BARHI BY USING CELL SUSPENSION CULTURE TECHNIQUEe
INFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM BARHI C.V BY USING CELL SUSPENSION CULTURE TECHNIQUE
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreIn this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.