Background. Gene polymorphisms affect etanercept’s pharmacokinetics, pharmacodynamics, and side effects. This effect is evidenced by the extensive genetic variation in the drug’s targets. Objectives. This study aims to find the association between different genotypes of the promoter region of the TNF-α gene at -308G/A(rs1800629), -857C/T(rs1799724), -863 C/A(rs1800630), -1031 T/C (rs1799964), -806 C/T (rs4248158) and -376 G/A (rs1800750) and the side effects of ETN that occurred to Iraqi RA patients. Method. The trial included patients with rheumatoid arthritis who had been using ETN for at least six months. The participants were from the Baghdad Teaching Hospital Rheumatology Unit. The PCR was sequenced to determine the polymorphism in the TNF- promoter region at sites -308 G/A (rs1800629), -857 C/T (rs1799724), -863 C/A (rs1800630), -1031 T/C (rs1799964), and -376 G/A (rs4248158) (rs1800750). The link between the genetic variation at these loci and the etanercept’s most frequent adverse effect was then investigated. Results. The only genotype of (-376 G/A) significantly related to an increased risk of upper respiratory tract infection is the GG genotype, according to the results of this study. However, genotypes for the remaining SNPs did not demonstrate a statistically significant association between ETN and an increased risk of upper respiratory tract infections, injection site response, or skin rash in patients. Conclusion. This study revealed that only the GG genotype of (-376 G/A) was significantly associated with an elevated risk of upper respiratory tract infection.
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreMaximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreAbstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show More
It was in the statement of the impact of moderation in preserving the freedom of individuals, including freedom of personal opinions, freedom of belief and freedom of language. It was dedicated to explaining the negative impact on the future of the nation in opposing moderation, including: dispersal of society, weakening the capabilities of society, and ease of control and occupation
The consequences of divorce after separation have several legal and legal provisions among them is that the wife must wait for a certain period specified by the legislator before marrying another, whether her husband left her after the practice of interning or died until the expiration of the period of counting and compensation for arbitrary divorce and the right of the unmarried to live in the marital home and complete her dowry is gold. But it cannot block the object of material and moral damage, especially if it was fired without shortening them and therefore these rights were decided by the provisions of the absolute and remove the effects on its reputation
The importance of this study of the growing importance of perception of touch and its association with the job performance of industrial product since the perception stereotactic means he means practiced by the individual through job performance and has assets of knowledge in the mind of the user and require him to mind the capabilities and knowledge cognitive following their individual focus Zhennea.oanfalh following their enthusiasm when using Sense of touch. The study in the first chapter of the research problem to reveal the role played by the process of cognition and its relationship with the touch function of the industrial product and the associated defect in performance and harder to use. The study also pointed to the research ob
... Show MoreBackground: The microbial production of substances that have the potency to suppress the growth of other microorganisms is probably one of the prevalent defense strategy developed in nature, microorganisms produce a variable bunch of microbial defense systems, which include antibiotics, metabolic by-products, lytic agents, bacteriocins and others. Objective: The purpose of the present study was to isolate and identify Enterococcus faecium isolates then detecting its ability of carrying the gene responsible for enterocin production in this species. Materials and methods: Out of 50 samples from different sources (food and clinical sources) were collected for the Enterococcus faecium isolation, and the isolated bacteria Enterococ
... Show More