Preferred Language
Articles
/
HhfWoJIBVTCNdQwCv7tG
The Impact of rs767455 and rs1061622 Polymorphisms ‎on ‎Treatment Outcomes in Iraqi Ankylosing Spondylitis ‎Patients Taking ‎Etanercept
...Show More Authors

Background: Ankylosing spondylitis (AS) is inflammation of the sacroiliac joints and spine, associated with clinical symptoms such as pain and stiffness in the vertebral column, after which, in a considerable number of individuals, new bone growth occurs. Objective: The current research study attempted to find out whether the presence of SNPs in TNF receptor [TNFRSF1A (rs767455), TNFRSF1B (rs1061622)] encoding genes could influence patients' outcomes to etanercept in a specimen of Iraqi AS patients. Patients and methods: Sixty patients with established AS receiving only etanercept were selected to be enrolled in this research with a mean age of 40.75 ± 8.67 years, 51 patients of them were males and only 9 patients were females. Patients were classed as "responders" if just obtained a BASDAI 50 clinical response and as "non-responders" if they can't achieve a BASDAI 50 clinical elaboration after at least 6 months treatment. After PCR products amplification of purified blood DNA, TNF receptor (TNFRSF1A and TNFRSF1B) genes SNPs were established by Sanger sequencing. Results: The analysis of this study expressed that there was a significant incidence of TT genotype of rs1061622 (P = 0.022) in responder group, whereas the TG genotype of the same SNP was considerably present in the group that did not respond (P = 0.002). Finally, a non-significant difference existed in alleles and genotypes frequency between responder and non-responder groups of rs767455 SNP in TNFRSF1A gene. Conclusions: The wild TT genotype of rs1061622 predicts etanercept responsiveness in ankylosing spondylitis patients. The TG genotype of the same SNP increases the probability of non-responding

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Process Safety And Environmental Protection
Safety and health management response to COVID-19 in the construction industry: A perspective of fieldworkers
...Show More Authors

View Publication
Scopus (50)
Crossref (49)
Scopus Clarivate Crossref
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
Facilitating Tributaries (Supporters) in the Differences between Al Dhadhiya and Al Dhaiya": Dhadhiya and Al Dhaiya"
...Show More Authors

   الضاد والظاء موطن تفرد العربية وفخرها ، الفت فيهما العشرات والعشرات من المصنفات الثرّة لكثرة ذرائع تلابسهما والخلط بينهما ، فهما متشابهان في هيكل البناء ، وإخراجهما متداخل على اللسان ، وألفاظهما متناظرة برحابة في الإملاء ، فضلاعن  اشكالهما  إلى حدّ الآن ، مما حثني على التفكير في وسائل تسهل المطروح وتمد جسراً بين أجزائه عسى أن تدنو قطافه في دفع الشبهة ومواراتها ، فتحصلت لي امور ادرتها بكلمتين مف

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The relationship between foreign direct investment and economic growth in Iraq after 2003(reality and ambition)
...Show More Authors

Foreign direct investment is considered one of important bases to blind economy for many. Countries as if the main stage for developing national economy ,so for this ,many of countries give great prominence to the role of drivel foreign investment due to its importance as one of economic growth pillars in the developing countries. They offer a support for modern technology, organizational and managerial skills.        

  Dneto the importance of direct foreign investment on the economic growth, today, we discover that Iraq in need to rebnlid the in frastructuve and renew what has been destroyed during was in many production and export institutions . as wel

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Educational And Psychological Researches
Teaching methods approved in the university and its relationship to classroom discipline and management proposals treated
...Show More Authors

The study aims detection teaching modalities adopted relationship in Jerash University exactly the classroom, and to achieve the goal of the study was to develop a questionnaire consisting of (39) items, and was achieving validity and reliability have, then sent to a sample of professors made up the university from (122) university professor of the total (172) professor, and they study population.

     Study found a relationship between the teaching methods of the four their strategies with classroom management, and as a result the overall average level, while Hspt critical thinking at the highest correlation with classroom discipline management relationship strategy, while the relatio

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Risk measurement and its role in preparing the target cash flow statement and rationalizing administrative decisions
...Show More Authors

Abstract :

The Aims of this research is to describe the concept of risk, its type and method of measurement, and to clarify the impact of these risks on the expected cash flow statement and the preparation of the target cash flow statement that takes these risks into consideration. Because the local economic environment is exposed to many risks, Therefore, this list will be predictive, which will help the economic unit to make administrative decisions, especially decisions related to operational, investment and financing activities. Therefore, the research problem is based on the fact that most of the local economic units are the list of flows According to the actual basis and not according to the discretionary basis (bud

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref