Rheumatoid arthritis is an autoimmune diseasecharacterized by chronic inflammationthat affects joints and cartilage. Bone complications such asRA-relatedosteoporosis are one of the most extra-articular manifestations. Many inflammatory mediators are released during RA disease pathophysiology; these mediators stimulate osteoclast genesis of bone by direct effects on RANKL and OPG. The study aimedto measure RANKL, OPG in RA patients treated with Etanercept only and other groups treated with Methotrexate onlyat baseline and after three months to evaluate bone state. An observational case-control prospective study was done on 30 RA patients who received MTX, 30 RA patients who received ETN, and 30 healthy,age-matched control groups. The level of RANKL and OPG was measured at baseline and after three months of therapy by immunoenzymatically assay (ELISA). The results were tabulated and statistically analyzed usingthe statistical package for social science. The result demonstrated that RANKL level had a positive correlation with age and disease duration in contrast to OPG level showed a negative correlation with age and duration of disease. In the patients group treated with MTX at baseline, the RANKL level was significantly higher (181.336±65.583) than post-therapy (166.097±69.229), while the OPG level at baseline significantly lower (594.398±133.238) than post therapy (614.499±150.879). In ETN treated patients, the level of RANKL in baseline was significantly higher than (231.247±73.134) RANKL level post-therapy (200.363±76.807), while OPG level in baseline waslower (463.263±96.392) than post therapy (503.608±107.692). The study demonstrated in baseline RANKL/OPG ratio significant higher (0.4340±0.234) than post therapy (0.3690±0.222). All RA patients had or were at high risk for osteoporosis.Both Etanarcept and methotrexate produce insignificant differences on OPG and RANKL levels, in the same time this biomarkers are not good indicators for bone state.
Chronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation(called Ph chromosome) in hematopoietic stem cells (HSCs).JAK2V617F mutation is an acquired singlenucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancyother than CML. This study aimed to investigate the prevalence of JAK2V617F mutation and serum levels ofalkaline phophatase (ALP) and lactate dehydrogenase (LDH) in Ph+ CML Iraqi patients treated with imatinib.Blood samples were collected from 42 Ph+ CML patients who have been received at least six month therapywith imatinib. DNA was extracted, and real time polymerase chain reaction (qPCR) was used for JAK2V617Fdetection. Serum levels of A
... Show MoreThe aims of the present study are to evaluate the levels of CA19-9 in sera and tissues' homogenate of breast and thyroid benign patients in order to assess its use as an early diagnostic parameter in differentiation between malignant and benign cases. The study was conducted on 8 patients with breast benign tumor and 8 patients with thyroid benign tumor, by the enzyme linked immunosorbent assay (ELISA) technique. The results of CA19-9 levels in sera were (15 ±1.58 and 10.67 ±2.08)U/ml respectively compared with serum CA19-9 levels of control group which was 7.74 ±4.92 U/ml, the results were found to be highly significantly in breast tumor patients and non significantly in thyroid
... Show MoreRecent accumulated evidences suggest that prolactin is an important immunomodulator and may have a role in the pathogenesis of systemic lupus erythematosus (SLE). The aim of this study was to assess the frequency of hyperprolactinemia in women with SLE and to evaluate its correlation with disease flares. Serum prolactin levels were measured in 62 women with SLE and 50 age- and sex-matched healthy controls. In patients and control groups prolactin levels were determined by immunoradiometric assay (IRMA). The prolactin level was found to be higher than normal rang in (40.3%) of SLE patients in active stage versus only (8.06%) of the same SLE patients but in the inactive stage and in (4%) of control group, the elevation was ranging between mi
... Show MoreThe use of containers in transportation leads to the reduction in time and effort of the process of loading and unloading of goods as well as protecting the goods from damage and breakage and to reduce the financial costs.
. This development has led also to make changes in the sizes and capacity of ships, therefore changes in the ports must be taken place where they must be provided with an appropriate depth for such vessels, that means the increase in the depth of ports and the establishment of wide storage yards and to provide appropriate mechanisms for handling process.
In this study, the researcher has dealt with this type of transport business in Iraqi ports, namely:
1- Khur Al-Zubair port.
2- Um Qaser port.
In order
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show More