Assessment of Salivary Macrophage Inflammatory Protein-1 Alpha Level in Different Stages of Periodontitis, Riyam Muthanna Muhammed*, Hadeel Mazin Akram
Multiple studies support a role for inflammation in the pathogenesis of coronary atherosclerosis and unstable cardiac syndromes. However, of the known pro-inflammatory cytokines, only elevated plasma levels of interleukin-6(IL-6) have been linked to Unstable Angina. We sought to examine the plasma levels of other major proinflammatory cytokines in similar clinical settings patients with unstable angina and acute myocardial infarction and the relationship extent between them. This study aimed to investigate and compare the level of IL-1 in Unstable Angina and Acute Myocardial Infarction patients. Thirty patients with unstable angina and thirty patients with Acute Myocardial Infarction, also thirty healthy individual as control were included
... Show MoreType 1 diabetes (T1D) is an autoimmune disease with chronic nature resulting from a combination of both factors genetic and environmental. The genetic contributors of T1D among Iraqis are unexplored enough. The study aimed to shed a light on the contribution between genetic variation of interleukin2 (IL2) gene to T1D as a risk influencer in a sample of Iraqi patients. The association between IL2−330 polymorphism (rs2069762) was investigated in 322 Iraqis (78 T1D patients and 244 volunteers as controls). Genotyping for the haplotypes using polymerase chain reaction test – specific sequence primer (PCR-SSP) for (GG, GT, and TT) genotypes corresponding to (G and T) alleles were performed. A significant association revealed a decreased freq
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Verrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs a
The reactions of ozone with 2,3-Dimethyl-2-Butene (CH3)2C=C(CH3)2 and 1,3-Butadiene CH2=CHCH=CH2 have been investigated under atmospheric conditions at 298±3K in air using both relative and absolute rate techniques, and the measured rate coefficients are found to be in good agreement in both techniques used. The obtained results show the addition of ozone to the double bond in these compounds and how it acts as function of the methyl group substituent situated on the double bond. The yields of all the main products have been determined using FTIR and GC-FID and the product studies of these reactions establish a very good idea for the decomposition pathways for the primary formed compounds (ozonides) and give a good information for the effe
... Show MoreIn this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
A new colorimetric-flow injection method has been developed and validated for the detection of Cefotaxime sodium in pharmaceutical formulations. This method stands out for its rapid and sensitive nature. The formation of a brown-colored complex between Cefotaxime sodium and the Biuret reagent in a highly alkaline environment serves as the basis for the detection. The intensity of this colored complex is measured using a custom-built Continuous Flow Injection Analyzer, enabling accurate quantification of Cefotaxime sodium. Optimization studies of the chemical and physical parameters such as dilution of Biuret reagent, effect of the medium basicity, flow rate, sample loop and others have been investigated. The calibration gra
... Show More