ackground An autoimmune and inflammatory illness called rheumatoid arthritis (RA) occurs when your immune system mistakenly attacks normal cells in your body. Interleukin-35 is a brand-new cytokine that belongs to the immunosuppressive and anti-inflammatory IL-12 family. β -herpesvirus that produces inflammation and stays dormant in its host for life is the human cytomegalovirus. Human herpesvirus (HCMV) has been at the core of several RA-related theories. Objective The current study looked at the association between RA and serum IL-35 levels as well as the association between RA and CMV. Patients and methods Blood samples were taken in the Baghdad Teaching Hospital and Typical Rheumatology Unit from January 2022 to Mars 2022 for the current study, which comprised 70 Iraqi patients with RA illnesses and 22 Iraqi controls. ELISA was utilized to measure the biomarkers in this investigation, including the levels of IL-35 and anti-CMV lgG. Results In comparison to control group, RA patients had increased levels of IL-35, but there was no statistical significant difference between the two groups. Because all participants in our research had anti-CMV IgG, it was determined that both sick and healthy individuals had previously been infected with the virus. Conclusion Our results showed the role of IL-35 as a cytokine against inflammation and contributed to the control of RA pathogenesis, as well as the association between IL-35 and HCMV and whether the illness is active or not.
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreBackground: Human semen contains high concentrations of fructose, zinc (Zn) and copper (Cu) in bound and ionic forms for Zn and Cu. The presence of abnormal levels of fructose and those trace elements may affect spermatogenesis with regard to production, maturation, motility and fertilizing capacity of the spermatozoa.Objective: To evaluate the levels of fructose, Zn and Cu in seminal plasma in different groups of male infertility and to correlate their concentrations with various sperm parameters.Methods: The concentrations of fructose, Zn and Cu were measured in 114 semen samples from normozoospermic, oligozoospermic, astheno-zoospermic, and azoospermic men using the electrothermal-atomic absorption spectrometry for Zn and Cu determinatio
... Show MoreDeontic modality expresses what is necessary or possible according to the norms of morality and laws of community. It is a cover term for those cases where modal auxiliaries used to express notions like ''obligation'', ''prohibition'' and, ''permission''. Deontic modals are basically performatives, having the ''so-be-it'' component of directives in that the speaker directs the behavior of the addressee to get things done. The present study identifies the use of deontic models in international contracts to prove that there are major pragmatic strategies employed in writing them. To achieve the aim of the study, a modified model of Danet’s (1980) and Trosborg’s (1995) in accordance to Searle (1969) is used to analyze 16 texts selected fro
... Show MoreBackground: The use of electronic apex locators for working length determination eliminates many of the problems associated with the radiographic measurements (interference of anatomical structures, errors in projection such as elongation or shortening, and lack of three-dimensional representation). Its most important advantage over radiography is that it measures the length of the root canal to the apical constriction, not to the radiographic apex. The aim of this study was to assess the accuracy of a new fifth generation apex locator (Joypex 5) in recording the apical constriction and comparing it with a third generation apex locator (Root ZX) in vitro. Materials and method: Twenty four single-rooted sound human premolars, extracted for t
... Show MoreCovalent modification of protein by drugs may disrupt self-tolerance, leading to lymphocyte activation. Until now, determination of the threshold required for this process has not been possible. Therefore, we performed quantitative mass spectrometric analyses to define the epitopes formed in tolerant and hypersensitive patients taking the β-lactam antibiotic piperacillin and the threshold required for T cell activation. A hydrolyzed piperacillin hapten was detected on four lysine residues of human serum albumin (HSA) isolated from tolerant patients. The level of modified Lys541 ranged from 2.6 to 4.8%. Analysis of plasma from hypersensitive patients revealed the same pattern and leve
Background: Beta thalassemia major is an inherited disorder that may affect general and oral health.The purpose of this study was toassess the severity of dental caries in relation to oral cleanliness, mutans streptococciamong a group of boys with beta thalassemia majorin comparison with a control group. Materials and Methods: The study involved 30 boys with BTM aged 10-12 years compared to 30 healthy boys with the same age group. d1-4mfs and D1-4 MFS indices were applied (Muhlemann, 1976), the viable counts of mutans streptococci in stimulated saliva were also determined. Results: The entire thalassemic group was caries-active. For both dentitions, a higher dmfs/DMFS values were recorded for study compared to control group, difference was
... Show MoreEffects of Ozonated Water on Micro Leakage between Enamel and Fissure Sealants Prepared by Different Etching Technique (An in vitro Study), Baraa M Jabar*, Muna S Khalaf
The objective of the investigation was to analyze the structure and administration of the political system in Iraq (post-ISIS). After 2003, the Iraqi political system suffered the fundamental problem of its failure to achieve the political and social inclusion that characterizes democratic systems, to guarantee the establishment of a "state for all", while respecting differences. Political representation has moved from the system of sectarian ethnic components, under the title of consensual democracy, to the representation of leaders and the realization of their interests and the interests of their parties at the expense of the groups that claim to represent them, which complicates the problem. In this sense, the new political syste
... Show More