Background: Rheumatoid arthritis (RA) is an autoimmune disorder that involves autoantibodies attacking and weakening joints. RA is characterized by leukocyte (Monocyte, Lymphocyte mast cell .etc) infiltrations into the synovial compartment leading to inflammation in the synovial membrane. Synovitis leads to the release of pro-inflammatory cytokines, matrix metalloproteinases, chemokines, complement proteins, and growth factors. Objective: The current study pointed to verify the diagnostic values of interleukin -17 A and interleukin -18 in Rheumatoid arthritis (RA) patients and the effect of treatment thereon. Study subjects and methods: A total of 88 samples with RA were selected from the health clinics of AL-Yarmouk teaching hospital/rheumatology clinic in Baghdad, with female rheumatoid arthritis patients as the patient group (50) and (38) healthy females as the control group. All patients were exposed to clinical, laboratory, and ultrasound assessments, besides measuring the serum level of both (IL-17A and IL-18) by the method of Enzyme-linked immunosorbent assay (ELISA). Results: The results show that there is a significant difference (p≤0.05) in IL-17A levels between patients and controls. The concentration of IL-17A in premenopausal patients is higher when compared to control groups (18.06 ± 3.85 vs 15.71 ± 1.82 pg/ml), so, the concentration in postmenopausal studied groups (17.19 ± 2.91 vs 14.13 ± 1.06 pg/ml). Also, there are significant differences (p≤0.05) in the level of IL-18 between the patients and the control; it is found that the level of IL-18 within the premenopausal patients was higher compared to the control (16.09 ± 9.69 vs 12.52 ± 8.30 pg/ml). Conclusion: A High level of IL-17A in RA patients contributes to the pathogenesis of RA as an inflammatory disease. As well as, the elevated levels of IL-18 suggest its physiological role to induce inflammatory disorder Treatment with (MTX and Etanercept) causes a decrease in the inflammatory markers of this disease RF in patient groups.
People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreThe adsorption of fexofenadine drug by activated charcoal powder impregnated with hydrogen peroxide (IAC) to improve its surface properties was investigated. The investigation also aimed to assess the effect of the repeated dose in increasing the amount of the drug adsorbed. The powder activated charcoal was impregnated with H2O2 3%. The effects of pH of the solution, concentration of the drug and time of the reaction parameters were investigated by using UV-Vis spectroscopy. The IAC was brought in contact with the drug solution in different pH (2, 4, 7 and 9), drug concentrations (30, 60, 90 and 120 µg ml-1) and time (15, 30, 45 and 60 minutes). After each experiment, a repeated dose of IAC was introd
... Show MoreThe main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the re
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Graphene (Gr) decorated with silver nanoparticles (Ag NPs) were used to fabricate a wideband range photodetector. Silicon (Si) and porous silicon (PS) were used as a substrate to deposit Gr /Ag NPs by drop-casting technique. Silver nanoparticles (Ag NPs) were prepared using the chemical method. As well as the dispersion of silver NPs is achieved by a simple chemistry process on the surface of Gr.
The optical, structure and electrical characteristics of AgNPs and Gr decorated with Ag NPs were characterized by ultraviolet-visible spectroscopy (UV-Vis), x-ray diffraction (XRD). The X-ray diffraction (XRD) spectrum of Ag NPs exhibited 2θ values (38.1o, 44.3 o, 64.5 o and 77.7
... Show MoreHand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show More