Rheumatoid arthritis is an autoimmune diseasecharacterized by chronic inflammationthat affects joints and cartilage. Bone complications such asRA-relatedosteoporosis are one of the most extra-articular manifestations. Many inflammatory mediators are released during RA disease pathophysiology; these mediators stimulate osteoclast genesis of bone by direct effects on RANKL and OPG. The study aimedto measure RANKL, OPG in RA patients treated with Etanercept only and other groups treated with Methotrexate onlyat baseline and after three months to evaluate bone state. An observational case-control prospective study was done on 30 RA patients who received MTX, 30 RA patients who received ETN, and 30 healthy,age-matched control groups. The level of RANKL and OPG was measured at baseline and after three months of therapy by immunoenzymatically assay (ELISA). The results were tabulated and statistically analyzed usingthe statistical package for social science. The result demonstrated that RANKL level had a positive correlation with age and disease duration in contrast to OPG level showed a negative correlation with age and duration of disease. In the patients group treated with MTX at baseline, the RANKL level was significantly higher (181.336±65.583) than post-therapy (166.097±69.229), while the OPG level at baseline significantly lower (594.398±133.238) than post therapy (614.499±150.879). In ETN treated patients, the level of RANKL in baseline was significantly higher than (231.247±73.134) RANKL level post-therapy (200.363±76.807), while OPG level in baseline waslower (463.263±96.392) than post therapy (503.608±107.692). The study demonstrated in baseline RANKL/OPG ratio significant higher (0.4340±0.234) than post therapy (0.3690±0.222). All RA patients had or were at high risk for osteoporosis.Both Etanarcept and methotrexate produce insignificant differences on OPG and RANKL levels, in the same time this biomarkers are not good indicators for bone state.
The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie
... Show Moreתקציר :
המחקר הזה הוא ניסיון לשפוך אור על נושא מרכזי וחשוב בחייהם של היהודים, "הממד הדתי" אצל היהודים, מחקרי הנקרא "הממד הדתי בסיפור העברי המודרני" גם מתייחס להשפעת התרבות הדתית של המספר והחוג המשפחתי שחי בו, ואיך שיקף המספר את כל הדברים האלה ביצירותיו הסיפורית .
המספר בוחר במילים ובמונחים בעלי משמעויות דתיות או מביא את הסיפור הזה אשר קרוב אל נושא הסיפור ההולך באותה מגמה .גם כן השפעת התיאולג
... Show MoreMobile advertising has become the product of an influential actor in the creation of design ideas that attract the recipient, according to the needs of the society and the interactions of the technological technical age, what the technologies of the mock programs do and what corresponds to the expectations of the recipient, and what the design methods achieve of synchronization and sound in which all The research has found ways to address the most exciting and important snapshots and focus on diversity and diversity, formality, image and color, and what the optical degrees and chromatography achieve sought to attract attention, which contributes from the point of view of the researchers in the field of accuracy, clarity, attention and co
... Show MoreThis study was conducted with the aim to extract and purify a polyphenolic compound “ Resveratrol†from the skin of black grapes Vitis vinifera cultivated in Iraq. The purified resveratrol is obtained after ethanolic extraction with 80% v/v solution for fresh grape skin, followed by acid hydrolysis with 10% HCl solution then the aglycon moiety was taken with organic solvent
( chloroform). Using silica gel G60 packed glass column chromatography with mobile phase benzene: methanol: acetic acid 20:4:1 a
... Show MoreNonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.
We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull bas
The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates
... Show MoreThe aim of t his p aper is t o const ruct t he (k,r)-caps in t he p rojective 3-sp ace PG(3,p ) over Galois field GF(4). We found t hat t he maximum comp let e (k,2)-cap which is called an ovaloid, exist s in PG(3,4) when k = 13. Moreover t he maximum (k,3)-cap s, (k,4)-cap s and (k,5)-caps.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More