Preferred Language
Articles
/
HhfWoJIBVTCNdQwCv7tG
The Impact of rs767455 and rs1061622 Polymorphisms ‎on ‎Treatment Outcomes in Iraqi Ankylosing Spondylitis ‎Patients Taking ‎Etanercept
...Show More Authors

Background: Ankylosing spondylitis (AS) is inflammation of the sacroiliac joints and spine, associated with clinical symptoms such as pain and stiffness in the vertebral column, after which, in a considerable number of individuals, new bone growth occurs. Objective: The current research study attempted to find out whether the presence of SNPs in TNF receptor [TNFRSF1A (rs767455), TNFRSF1B (rs1061622)] encoding genes could influence patients' outcomes to etanercept in a specimen of Iraqi AS patients. Patients and methods: Sixty patients with established AS receiving only etanercept were selected to be enrolled in this research with a mean age of 40.75 ± 8.67 years, 51 patients of them were males and only 9 patients were females. Patients were classed as "responders" if just obtained a BASDAI 50 clinical response and as "non-responders" if they can't achieve a BASDAI 50 clinical elaboration after at least 6 months treatment. After PCR products amplification of purified blood DNA, TNF receptor (TNFRSF1A and TNFRSF1B) genes SNPs were established by Sanger sequencing. Results: The analysis of this study expressed that there was a significant incidence of TT genotype of rs1061622 (P = 0.022) in responder group, whereas the TG genotype of the same SNP was considerably present in the group that did not respond (P = 0.002). Finally, a non-significant difference existed in alleles and genotypes frequency between responder and non-responder groups of rs767455 SNP in TNFRSF1A gene. Conclusions: The wild TT genotype of rs1061622 predicts etanercept responsiveness in ankylosing spondylitis patients. The TG genotype of the same SNP increases the probability of non-responding

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Educational And Psychological Researches
Teaching methods approved in the university and its relationship to classroom discipline and management proposals treated
...Show More Authors

The study aims detection teaching modalities adopted relationship in Jerash University exactly the classroom, and to achieve the goal of the study was to develop a questionnaire consisting of (39) items, and was achieving validity and reliability have, then sent to a sample of professors made up the university from (122) university professor of the total (172) professor, and they study population.

     Study found a relationship between the teaching methods of the four their strategies with classroom management, and as a result the overall average level, while Hspt critical thinking at the highest correlation with classroom discipline management relationship strategy, while the relatio

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Risk measurement and its role in preparing the target cash flow statement and rationalizing administrative decisions
...Show More Authors

Abstract :

The Aims of this research is to describe the concept of risk, its type and method of measurement, and to clarify the impact of these risks on the expected cash flow statement and the preparation of the target cash flow statement that takes these risks into consideration. Because the local economic environment is exposed to many risks, Therefore, this list will be predictive, which will help the economic unit to make administrative decisions, especially decisions related to operational, investment and financing activities. Therefore, the research problem is based on the fact that most of the local economic units are the list of flows According to the actual basis and not according to the discretionary basis (bud

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
Free will between Slavery and Freedom: A Study of Linda Brent in Incidents in the Life of a Slave Girl by Harriet Jacobs
...Show More Authors

Harriet Jacobs was a writer and a reformer. As a female writer in the nineteenth century, Jacobs wrote her narrative as a means of resisting the system of slavery. She wrote her book Incidents in the Life of a Slave Girl: Written by Herself, (1842) to reflect upon the exploitation of the black people and the need to change the hierarchal attitude that governs white/black relations. She was engaged in many abolitionist events and her anti-slavery approach appeared clearly in her writings. She shares Du Bios ideas about freedom and emancipation and the need for a political and cultural change. Thus, Du Bois’s theory provides a framework for her autobiographical novel where she portrays Linda Brent, the main character, a strong w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
(The Segmentation of Industrial Market and its Effect in Targeting Market : An descriptive analytical study for a sample of industrial companies in Iraq)
...Show More Authors

 This study deals with segmenting the industrial market as an independent variable and targeting the industrial market as a dependent variable. Since the industrial sector represents one of the most important fundamental pillars to build the economies of countries and their development , the Iraqi industrial sector was chosen as a population for the study . Based on measuring the study variables , identifying them and testing the correlation and effect on each other , the study reached a group of findings:

1- Increasing the level of availability of study variables inside the companies “The study sample”.

2- There is a correlation between the independent v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use sensitivity analysis in evaluating projects Investment under the conditions of risk and uncertainty Case study of glass bottles project in Anbar province
...Show More Authors

This paper studies the investment project evaluation under the condition of uncertainty. Evaluation of investment project under risk and uncertainty is possible to be carried out through application of various methods and techniques. The best known methods are : Risk-adjusted discount rate , certainty equivalent method , Sensitivity analysis and Simulation method The objective of this study is using the sensitivity analysis in evaluation Glass Bottles project  in Anbar province under the condition of risk and uncertainty.

After applying sensitivity analysis we found that the glass bottles project  sensitive to the following factors (cash flow, the cost of investment, and the pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages
Free will between Slavery and Freedom: A Study of Linda Brent in Incidents in the Life of a Slave Girl by Harriet Jacobs
...Show More Authors

Harriet Jacobs was a writer and a reformer. As a female writer in the nineteenth century, Jacobs wrote her narrative as a means of resisting the system of slavery. She wrote her book Incidents in the Life of a Slave Girl: Written by Herself, (1842) to reflect upon the exploitation of the black people and the need to change the hierarchal attitude that governs white/black relations. She was engaged in many abolitionist events and her anti-slavery approach appeared clearly in her writings. She shares Du Bios ideas about freedom and emancipation and the need for a political and cultural change. Thus, Du Bois’s theory provides a framework for her autobiographical novel where she portrays Linda Brent, the main character, a strong wille

... Show More
View Publication
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref