Background: Rituximab is a chimeric IgG1 kappa immunoglobulin that has been genetically modified to incorporate human constant region sequences together with murine light- and heavy-chain variable region sequences. People use it to treat rheumatoid arthritis and certain malignancies. Objective: The study aimed to assess the potential association between the serum levels of Factor I, CD59, interleukins (IL)-6, and interferon-gamma (IFN)-γ and the response to Rituximab treatment in Iraqi rheumatoid arthritis patients. Methods: A cross-sectional study was conducted at the rheumatology center at Baghdad Teaching Hospital. Ninety adult patients who have been diagnosed with rheumatoid arthritis and are receiving Rituximab intravenous infusions were included. The enrolled patients were divided into a responder group (45 patients) and a non-responder group (45 patients). The response to Rituximab was assessed according to the 28-joint Disease Activity Score (DAS28). Results: The serum levels of Factor I and CD59 were significantly higher in the non-responders group in comparison to the responders group. In addition, the serum IL-6 and IFN-γ levels were significantly elevated in the non-responders group in comparison to the responders group. The estimated marker serum levels showed a strong, significant correlation with the 6-month change in DAS28. Conclusions: In Rituximab nonresponder RA patients, serum levels of Factor I, CD59, Factor H, IL-6, and IFN-γ are higher, and they have good potential to be used in the assessment of the response to Rituximab therapy.
Autorías: Hadeer Idan Ghanim, Ishraq Mahmood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 3, 2021. Artículo de Revista en Dialnet.
The aim of this study is to identify the effect of enabling the effectiveness of the work of the audit committees in private commercial banks and to identify the extent of awareness of the importance of empowerment in the work of these committees, especially as it is known that these committees, especially the inspection committees that go to private banks and from various sources including committees of the Central Bank of Iraq Committees of the Securities Commission and finally committees of the external audit offices, through an analysis of the determinants of empowerment in the performance of the most important work of the audit committees, namely: supervising the process of preparing reports, supervising the system of intern
... Show MoreDr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.
In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very
... Show MoreThis research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MoreIn this work the effect of choosing tri-circular tube section had been addressed to minimize the end effector’s error, a comparison had been made between the tri-tube section and the traditional square cross section for a robot arm, the study shows that for the same weight of square section and tri-tube section the error may be reduced by about 33%.
A program had been built up by the use of MathCAD software to calculate the minimum weight of a square section robot arm that could with stand a given pay load and gives a minimum deflection. The second part of the program makes an optimization process for the dimension of the cross section and gives the dimensions of the tri-circular tube cross section that have the same weight of
... Show MoreThe research aims to identify banking stress tests, which is one of the modern and important tools in managing banking risks by applying the equations of that tool to the sample. The banking sector considered one of the most vulnerable to sudden and rapid changes in an unstable economic environment, making it more vulnerable. Therefore, it is necessary to establish a special risk management section to reduce the banking risks of the banking business that negatively affect its performance.
The research concluded that there is a direct relationship between stress tests and risk management, as stress tests are an essential tool in risk management. They also considered a unified approach in managing bank risks that helps the bank to
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreJurisprudential disagreements are a significant source of a vast jurisprudential wealth. Among the manifestations of these disagreements are scholarly critiques raised by some scholars against others, claiming their divergence from the legal evidence or established principles for deducing legal rulings. One such critique is presented by the narrator scholar Abu Bakr Ibn Abi Shaybah, may Allah have mercy on him, directed towards Abu Hanifah al-Nu‘man, may Allah have mercy on him. In his compilation, Ibn Abi Shaybah cited numerous hadiths and traditions that he considered conflicting with the judgments as perceived by Imam Abu Hanifah, may Allah have mercy on him. These issues cover various branches of jurisprudence, including worship, sale
... Show MoreThe aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More