Preferred Language
Articles
/
HxZb5ooBVTCNdQwCqadD
GENETIC ANALYSIS OF INTERLEUKIN 37GENE SINGLE NUCLEOTIDE POLYMORPHISMS IN ALOPECIA AREATA PATIENTS
...Show More Authors

Background: Alopecia areata(AA) is a common autoimmune disease that causes hair loss without scarring. It occurs as a result of T-helper 1 (Th1) and Th17 cells attacking the anagen hair follicles. Genetic factors play a role in the occurrence of infection, which stimulates the production of pro and anti-inflammatory interleukins. Polymorphisms of IL-37 play a role in autoimmune diseases. However, IL37 single nucleotide polymorphisms(SNP) have not been identified in patients with AA. Therefore, this study aimed to reveal the IL37 gene SNP and its relationship to AA. Methods: Genotyping of IL-37 gene single nucleotide polymorphisms SNPs were detected using sequence-specific primer-polymerase chain reaction (SSP-PCR) method was done following the protocol of DNA Extraction kit and PCR PreMix SNP Genotyping Assays in 51 (32 males & 19 females at age mean 27.90±1.66 years) patients with AA and 50 (21 males & 29 females at age mean30.64±2.08years ) healthy individuals. Results: The results of the present study showed a significant increase in the mean level of IL-37 in the serum of patients with AA compared to healthy subjects (184.18±69.45 vs.153.28±48.17) pg/ml. This increase did not constitute a significant difference at a probability level less than. In addition, genotypes of single nucleotide polymorphisms (SNPs) of IL-37 gene were rs3811045 (5756 T>C) and rs3811046 (5831 G>T) that result in substitution and inversion mutations, and thus cause a change in the type of amino acid. The CC and allele C and TC of rs3811045 were risk factors for AA due to a significantly higher odd ration (OR) value and a significantly increased frequency percentage in patients group compared to a healthy control group (37.50 vs 25.58 OR: 1.75 p = 0.264, 95% CI = 0.72–4.25, 66.0 vs 86.0 OR: 1.78 p = 0.068, 95% CI = 0.98–3.23; 56.25 vs 55.81 OR: 1.02 p = 1.0 95% CI = 0.45–2.31 respectively). Also the results of rs3811046 recorded that the TT and allele T frequency percentages were significant increase in patients group (39.58 vs 25.58 OR: 1.91 P = 0.184, 95% CI = 0.79-4.63, 66.0 vs. 52.0 OR: 1.74, P =0.072,95%CI= 0.96–3.15) respectively, which was a risk factor for infection. This study is the first of its kind to show the relationship of IL-37 level and genetic single nucleotide polymorphisms with AA. Conclusions The present study's results can conclude that the TC, CC and the C allele of IL-37 SNP rs3811045 and TT genotypes and the T allele of IL-37 SNP rs3811046 have a role in the risk of developing AA. It is recommended to conduct several genetic studies of other interleukin genes and to ascertain their relationship to AA. © 2023, Journal of Biomechanical Science and Engineering.

Scopus
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Determination Optimum Inventory Level for Material Using Genetic Algorithm
...Show More Authors

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.             &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 22 2024
Journal Name
Journal Of Petroleum Research And Studies
Optimizing Well Placement with Genetic Algorithms: A Case Study
...Show More Authors

Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty

... Show More
View Publication
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Automatic Approach for Word Sense Disambiguation Using Genetic Algorithms
...Show More Authors

Abstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Safety Profile of Single Daily Dose of Aminoglycosides in Comparison with Multiple Daily Dose
...Show More Authors

To overcome  the  problems  which  associated  with  the standard  multiple  daily  doses (MDD)

of aminoglycosides (AGs) like high incidence of toxicity(nephrotoxicity, ototoxicity)(5-25%) and high cost, an alternative approach was developed which was single daily dose (SDD).This new regimen was designed to maximize bacterial killing by optimizing the peak concentration/minimum inhibitory concentration(MIC)ratio and to reduce the potential for toxicity. The study includes 75 patients selected randomly, 50 of them received SDD regimen of age range of 17-79 years and the remaining received MDD regimen of age range of 13-71 years. The study was designed to evaluate the safety of SDD regim

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
On-Line Navigational Problem of a Mobile Robot Using Genetic Algorithm
...Show More Authors

Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Genetic Diversity and Polymorphism of Eucalyptus L՚He҆r Speciesby ITS Sequence
...Show More Authors

      Genus Eucalyptus belongs to the family Myrtaceae that consists of more than 700 species, various hybrids and varieties. The majorly distributed species that are grown in Iraq are Eucalyptus alba, E. macarthurii, E. siderophloia and E. camaldulensis, E. tereticornis, E. vicina. Most Eucalyptus species are highly dependent on rainfall, and this is challenged by climatic changes owing to global warming making it difficult to effectively match the availability of mature trees and the market demand, especially for use as power transmission poles. With the widespread availability of other naturally occurring Eucalyptus species, it has become important to determine the genetic diversity and to analyze the phenotypic tra

... Show More
View Publication
Scopus Crossref