Complement activation leads to membrane attack complex formation, which can lyse not only pathogens but also host cells. Histones can be released from the lysed or damaged cells and serve as a major type of damage-associated molecular pattern, but their effects on the complement system are not clear. In this study, we pulled down two major proteins from human serum using histone-conjugated beads: one was C-reactive protein and the other was C4, as identified by mass spectrometry. In surface plasmon resonance analysis, histone H3 and H4 showed stronger binding to C4 than other histones, with KD around 1 nM. The interaction did not affect C4 cleavage to C4a and C4b. Because histones bin
The researchers have a special interest in studying Markov chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one of the ministries. Results are analyzed by applying Maximum likelihood estimation and Ordinary least squares methods resulting
... Show MoreIn many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show MoreIn this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.
Background: Joint hypermobility was first mentioned by Hippocrates as an isolated feature, when he described the Celts' Incapacity to Pull a Bowstring or Throw a Dart, Due to The Slackness of Their Limbs
Objective: to determine the prevalence of mitral valve prolapse(MVP)in patients with benign hypermobility syndrome (BJHS).
Type of the study: Cross –sectional study.
Methods: Ninety patients with BJHS were included in this study. Full cardiological assessment was done for all of them, which include clinical examination, electrocardiography and echocardiography. Cardiac assessment was done for another sixty age and sex matched (
... Show MoreBackground:Parkinson’disease(PD) is a neurodegenerative disorder of the central nervous system characterized by resting tremor, bradykinesia, cogwheel rigidity, and impairment of postural reflexes; the frequency of PD increases with aging.Clinically Parkinson's disease characterized by two groups of symptoms: motor and non-motor symptoms.Non-motor symptoms can be categorized as autonomic, cognitive/psychiatric (may include depression, dementia, anxiety, hallucinations), sensory and rapid eye movements (REM) sleep behavior disorder (RBD).
Objectives:The objectives of this study are to find out the frequency of the non-motor symptoms of idiopathic Parkinson disease in a group of patients in Baghd
... Show MoreThis paper constructs a new linear operator associated with a seven parameters Mittag-Leffler function using the convolution technique. In addition, it investigates some significant second-order differential subordination properties with considerable sandwich results concerning that operator.
Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show More