Background: Ulcerative colitis (UC) is an inflammatory bowel disease restricted to the large intestine, characterized by superficial ulceration. It is a progressive and chronic disease requiring long-term treatment. Although its etiology remains unknown, it is suggested that environmental factors influence genetically susceptible individuals, leading to the onset of the disease. (C-X-C) ligand 9 is a chemokine that belongs to the CXC chemokine family, it plays a role in the differentiation of immune cells such as cytotoxic lymphocytes, natural killer T cells, and macrophages. Its interaction with its corresponding receptor CXCR3 which is expressed by a variety of cells such as effector T cells, CD8+ cytotoxic T cells, and macrophage, leads to stimulation of the production of IFN-γ and TNF-α and in turn, stimulates the production of Th1 chemokines which results in promoting the inflammation. Objectives: To assess the significance of serum chemokine (C-X-C) ligand 9 as a potential marker for identifying ulcerative colitis in adults with inflammatory bowel disease. Patients and Methods: This is a case-control study that included 50 patients diagnosed with UC, aged between 18 and 75 years, compared to 50 healthy controls, aged between 18 and 60 years. The study was conducted between November 2022 and March 2023, at the Gastroenterology and Hepatology Teaching Hospital at the Medical City Complex in Baghdad. The serum samples were analyzed using the Enzyme-Linked Immunosorbent Assay (ELISA) technique. Results: The mean ± SD in pg/ml of serum CXCL9 in patient group was 26.9 ± 9.05 and in control group was 6.4 ± 2.37 (p< 0.0001) which indicates a highly significant difference. Conclusion: CXCL 9 may be employed as a biomarker for identifying ulcerative colitis and it can be used as a tool for measuring disease activity, in addition to the possibility of being a potential therapeutic target.
This study deals with knowing the public relations activities of the Integrity Commission for the year 2007, knowing the contents of these activities, knowing the contents of the advertisements that it published, whether the contents of the advertisements were convincing, and whether press photographs were used in these advertisements, as well as whether symbols and slogans were used. What language and words were used to address the recipient? 1- What feelings do the contents of advertisements arouse? 2- Research objectives: This research aims to answer the following questions: What are the public relations activities carried out by the Integrity Commission? B: Are the contents of the advertisements published by the Authority convincing to
... Show More<p><span>This research deals with the feasibility of a mobile robot to navigate and discover its location at unknown environments, and then constructing maps of these navigated environments for future usage. In this work, we proposed a modified Extended Kalman Filter- Simultaneous Localization and Mapping (EKF-SLAM) technique which was implemented for different unknown environments containing a different number of landmarks. Then, the detectable landmarks will play an important role in controlling the overall navigation process and EKF-SLAM technique’s performance. MATLAB simulation results of the EKF-SLAM technique come with better performance as compared with an odometry approach performance in terms of measuring the
... Show MoreAhmed ibn Imad ibn Yusuf al-Aqfhasi (808 AH / 1405 AD) is a small message that speaks about the Nile River in all its sides, despite its limited papers, but it is one of the manuscripts of the important geographical literature for its geographical, historical, religious and grammatical information. it was not limited to the information of the author alore, but taken from many sources below, which added to the importance of the fact that it has saved us the names of the sources that preceded him in mentioning this river with the names of its authors.The method of the Aqfhasi was characterized by scientific methodology in writing and clarity, with reference to some of the myths that people carried in their minds about the Nile River at tha
... Show MoreSentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreThe heat exchanger is a device used to transfer heat energy between two fluids, hot and cold. In this work, an output feedback adaptive sliding mode controller is designed to control the temperature of the outlet cold water for plate heat exchanger. The measurement of the outlet cold temperature is the only information required. Hence, a sliding mode differentiator was designed to estimate the time derivative of outlet hot water temperature, which it is needed for constructing a sliding variable. The discontinuous gain value of the sliding mode controller is adapted according to a certain adaptation law. Two constraints which imposed on the volumetric flow rate of outlet cold (control input) were considered within the rules of the proposed
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More