Background: Ankylosing spondylitis (AS) is inflammation of the sacroiliac joints and spine, associated with clinical symptoms such as pain and stiffness in the vertebral column, after which, in a considerable number of individuals, new bone growth occurs. Objective: The current research study attempted to find out whether the presence of SNPs in TNF receptor [TNFRSF1A (rs767455), TNFRSF1B (rs1061622)] encoding genes could influence patients' outcomes to etanercept in a specimen of Iraqi AS patients. Patients and methods: Sixty patients with established AS receiving only etanercept were selected to be enrolled in this research with a mean age of 40.75 ± 8.67 years, 51 patients of them were males and only 9 patients were females. Patients were classed as "responders" if just obtained a BASDAI 50 clinical response and as "non-responders" if they can't achieve a BASDAI 50 clinical elaboration after at least 6 months treatment. After PCR products amplification of purified blood DNA, TNF receptor (TNFRSF1A and TNFRSF1B) genes SNPs were established by Sanger sequencing. Results: The analysis of this study expressed that there was a significant incidence of TT genotype of rs1061622 (P = 0.022) in responder group, whereas the TG genotype of the same SNP was considerably present in the group that did not respond (P = 0.002). Finally, a non-significant difference existed in alleles and genotypes frequency between responder and non-responder groups of rs767455 SNP in TNFRSF1A gene. Conclusions: The wild TT genotype of rs1061622 predicts etanercept responsiveness in ankylosing spondylitis patients. The TG genotype of the same SNP increases the probability of non-responding
There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreIn this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. In order to investigate the response of soil and footing to steady state dynamic loading, a physical model was manufactured. The manufactured physical model could be used to simulate steady state harmonic load at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into considerations include loading frequency, size of footing and different soil conditions. The footing parameters were related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used (100 200 12.5 mm) and (200 400 5.0 mm).
... Show MoreThis paper deals with the subjective reflections of consumer values on fashion design. The consumer self is determined by the consumer's idea of himself, according to the intellectual, spiritual and social values, and these values take their intellectual reflection in the form of material values that the consumer finds in fashion design. These values are based on considerations between what is intellectual represented by the values of the consumer, and what is material determined by the fashion design, which also proceed from values that are visible or implied in costume design, such as the function, beauty and symbol. The consumer self gets its material image represented in the
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show More