A rapid high performance liquid chromatography method for the determination of sphinganine (Sa) and sphingosine (So) in urine samples by employing a silica-based monolithic column is described. The samples were first extracted using ethyl acetate and derivatized using ortho-phthaldialdehyde in the presence of 2-mercaptoethanol. C20 sphinganine was used as internal standard. Under the optimized conditions, separation was achieved using a mixture of methanol:water (93:7, v/v), column temperature at 30°C, flow rate of 1 mL min−1, and an injection volume of 10 μL. Good linearity was obtained for Sa and So over the concentration range 20–500 ng mL−1(correlation coefficients ≥0.9978). The detection limits were 0.45 ng mL−1 for Sa and
... Show MoreThe clinical spectrum of cutaneous leishmaniasis (CL), an intracellular parasitic pathogen, ranges from a single sore healing to chronic crusty lesions with a manifestation of treatment resistance. The complicated interaction between Leishmania bodies and the early immune response, including innate and adaptive mechanisms, determines the evolution of nodules. This study examined the levels of the chemoattractant interleukin 8 (IL-8), pro-inflammatory nitric oxide (NO), and immunoregulatory macrophage inhibitory factor (MIF) in the serum of subjects recently diagnosed with cutaneous leishmaniasis, in parallel with patients being monitored during consecutive sodium stibogluconate (Pentostam) treatment. A total of 161 serum samples of newly di
... Show MoreThe research seeks to achieve its goal of demonstrating the impact of applying banking governance variables on the financial performance of Islamic banks, and the independent research variables are represented by (X) by (the number of independent members in the board (X1), the number of directors in the board (X2), the number of committees emanating from the board ( X3), the percentage of shares owned by major shareholders in the board (X4), the number of members of the Sharia supervisory board (X5)), and the dependent variable (Y) is represented by (rate of return on assets (Y1), rate of return on equity (Y2)).
The research sample included (4) Islamic banks, namely (Iraqi Islamic Bank, National Islamic Bank, Jihan Islamic Bank,
... Show MoreABSTRACT
The research aim is to determine the relation between governmental consumption expenditure (GCE) & GDP in Iraq for the period 1981-2006.
The research has determined the scale of optimization for (GCE) & try to know the extent productivity of this expenditure and using the long run &short run model to test .The results clarify the following
1-The marginal productivity for the (GCE) is positive so it is productive.
2-The (GCE) in Iraq is too high because the marginal productivity for the expenditure less than 1.
3- The (GCE) percentage to GNP is
... Show MoreAn approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
Objective : The study was carried out to construct an initial assessment documentation tool for nursing
recording system in Coronary Care Unit.
Methodology : A descriptive, purposive sample of (65) nurses was selected from CCU of main
teaching hospitals (Al Karama, Al Kindy, Al Kadimia, Al Yarmmok, Baghdad teaching hospital, Ibn
Al Naffis hospital) and Ibn-Al betar hospital in Baghdad city from the 15th of April 2004 to the 15th of
April 2006.
The instrument was constructed and comprised of two sections: section one included the
nurses' demographic characteristic; section two was the initial assessment documentation tool that
contained (2) parts including: General information form and the initial assessment form.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More