Background: Ankylosing spondylitis (AS) is inflammation of the sacroiliac joints and spine, associated with clinical symptoms such as pain and stiffness in the vertebral column, after which, in a considerable number of individuals, new bone growth occurs. Objective: The current research study attempted to find out whether the presence of SNPs in TNF receptor [TNFRSF1A (rs767455), TNFRSF1B (rs1061622)] encoding genes could influence patients' outcomes to etanercept in a specimen of Iraqi AS patients. Patients and methods: Sixty patients with established AS receiving only etanercept were selected to be enrolled in this research with a mean age of 40.75 ± 8.67 years, 51 patients of them were males and only 9 patients were females. Patients were classed as "responders" if just obtained a BASDAI 50 clinical response and as "non-responders" if they can't achieve a BASDAI 50 clinical elaboration after at least 6 months treatment. After PCR products amplification of purified blood DNA, TNF receptor (TNFRSF1A and TNFRSF1B) genes SNPs were established by Sanger sequencing. Results: The analysis of this study expressed that there was a significant incidence of TT genotype of rs1061622 (P = 0.022) in responder group, whereas the TG genotype of the same SNP was considerably present in the group that did not respond (P = 0.002). Finally, a non-significant difference existed in alleles and genotypes frequency between responder and non-responder groups of rs767455 SNP in TNFRSF1A gene. Conclusions: The wild TT genotype of rs1061622 predicts etanercept responsiveness in ankylosing spondylitis patients. The TG genotype of the same SNP increases the probability of non-responding
الضاد والظاء موطن تفرد العربية وفخرها ، الفت فيهما العشرات والعشرات من المصنفات الثرّة لكثرة ذرائع تلابسهما والخلط بينهما ، فهما متشابهان في هيكل البناء ، وإخراجهما متداخل على اللسان ، وألفاظهما متناظرة برحابة في الإملاء ، فضلاعن اشكالهما إلى حدّ الآن ، مما حثني على التفكير في وسائل تسهل المطروح وتمد جسراً بين أجزائه عسى أن تدنو قطافه في دفع الشبهة ومواراتها ، فتحصلت لي امور ادرتها بكلمتين مف
... Show MoreForeign direct investment is considered one of important bases to blind economy for many. Countries as if the main stage for developing national economy ,so for this ,many of countries give great prominence to the role of drivel foreign investment due to its importance as one of economic growth pillars in the developing countries. They offer a support for modern technology, organizational and managerial skills.
Dneto the importance of direct foreign investment on the economic growth, today, we discover that Iraq in need to rebnlid the in frastructuve and renew what has been destroyed during was in many production and export institutions . as wel
... Show MoreThe study aims detection teaching modalities adopted relationship in Jerash University exactly the classroom, and to achieve the goal of the study was to develop a questionnaire consisting of (39) items, and was achieving validity and reliability have, then sent to a sample of professors made up the university from (122) university professor of the total (172) professor, and they study population.
Study found a relationship between the teaching methods of the four their strategies with classroom management, and as a result the overall average level, while Hspt critical thinking at the highest correlation with classroom discipline management relationship strategy, while the relatio
... Show MoreAbstract :
The Aims of this research is to describe the concept of risk, its type and method of measurement, and to clarify the impact of these risks on the expected cash flow statement and the preparation of the target cash flow statement that takes these risks into consideration. Because the local economic environment is exposed to many risks, Therefore, this list will be predictive, which will help the economic unit to make administrative decisions, especially decisions related to operational, investment and financing activities. Therefore, the research problem is based on the fact that most of the local economic units are the list of flows According to the actual basis and not according to the discretionary basis (bud
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .