Background: Ulcerative colitis (UC) is an inflammatory bowel disease restricted to the large intestine, characterized by superficial ulceration. It is a progressive and chronic disease requiring long-term treatment. Although its etiology remains unknown, it is suggested that environmental factors influence genetically susceptible individuals, leading to the onset of the disease. (C-X-C) ligand 9 is a chemokine that belongs to the CXC chemokine family, it plays a role in the differentiation of immune cells such as cytotoxic lymphocytes, natural killer T cells, and macrophages. Its interaction with its corresponding receptor CXCR3 which is expressed by a variety of cells such as effector T cells, CD8+ cytotoxic T cells, and macrophage, leads to stimulation of the production of IFN-γ and TNF-α and in turn, stimulates the production of Th1 chemokines which results in promoting the inflammation. Objectives: To assess the significance of serum chemokine (C-X-C) ligand 9 as a potential marker for identifying ulcerative colitis in adults with inflammatory bowel disease. Patients and Methods: This is a case-control study that included 50 patients diagnosed with UC, aged between 18 and 75 years, compared to 50 healthy controls, aged between 18 and 60 years. The study was conducted between November 2022 and March 2023, at the Gastroenterology and Hepatology Teaching Hospital at the Medical City Complex in Baghdad. The serum samples were analyzed using the Enzyme-Linked Immunosorbent Assay (ELISA) technique. Results: The mean ± SD in pg/ml of serum CXCL9 in patient group was 26.9 ± 9.05 and in control group was 6.4 ± 2.37 (p< 0.0001) which indicates a highly significant difference. Conclusion: CXCL 9 may be employed as a biomarker for identifying ulcerative colitis and it can be used as a tool for measuring disease activity, in addition to the possibility of being a potential therapeutic target.
Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
the electron correlation effect for inter-shell can be described by evaluating the fermi hole and partial fermi hole for Li atom comparing with Be+ and B+2 ions
Ziziphora persica Bunge is recorded as a new Study in Iraq. This species has been collected from Jabal Sinjar in Nineveh province in the north western part of Iraq. The morphological characters, habitat and geographical distribution of the species with a key to Ziziphora L. species in Iraq have been provided.
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci
... Show MoreVisible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show More