داء المشوكات الكيسي (CE) هو مرض وبائي يسبب مرضًا خطيرًا وخسائر اقتصادية في معظم بلدان العالم. MiRNAs هي عامل جيني ضروري لتنظيم الاستجابة المناعية من خلال قدرته على التدخل في التعبير الخلوي ؛ واحد هذه الحوامض النووية الدقيقة -146 أ. هدفت الدراسة الحالية تقييم إذا كان بإمكاننا استخدام microRNA 146a كمؤشر حيوي للكشف عن CEو تحديد العلاقة بين التعبير الجيني microRNA 146a و IL-17 في مرضى CE.حيث اشتملت الدراسة على 50 مريضًا من CE تم إدخالهم إلى المستشفى في بغداد ، العراق و 50 من الأصحاء. تم جمع المصل للفترة من ايلول 2022 إلى حزيران 2023 . تراوحت أعمار العينات بين 20 - 55 سنة. بلغت اعلى نسبة الاصابة بالمشوكات الكيسية عند الاشخاص الذين يعيشون بالمناطق الريفية مقارنة بالذين يعيشون في المدن الحضرية (74.00٪ و 42.00٪) ، وشكلت الرئة العضو الأكثر إصابة (74٪) ، يليها الكبد (18٪) ، ثم الكبد والرئة معًا (8٪). لوحظ بان التعبير الجيني لل miRNA-146a في مرضى CE أعلى بكثير من أعضاء المجموعة الضابطة (4.33 ± 1.01 و 1.00 ± 0.23 على التوالي). هذا كما اظهرت النتائج بان مستوى IL-17 زاد بشكل ملحوظ في امصال المجموعة الضابطة 129.15 ± 4.73 نانوغرام / لتر مقارنة بالمرضى 105.99 ± 5.81 نانوغرام / لتر. الخلاصة: وفقًا للنتائج التي توصلنا إليها ،ارتفاع التعبير الجيني miRNA-146a في مصل مرضى CE يمكن ان يعد عاملا حيويا في تشخيص المشوكات، وهذا الزيادة تؤثر سلبًا بمستويات IL-17 المنخفضة مما يؤثر ويتداخل مع الاستجابة الالتهابية لجهاز المناعة وبالنتيجة يسهم في التسبب في CE.
Research summary
Backbiting pronouns have gained great importance in contemporary textual linguistic studies, as they play a coordinating function in the text and link its parts.
Interpreters did not overlook the role of backbiting pronouns in achieving the function of consistency and coherence in the Qur’anic text, as they referred to this, including Ibn Ashour, who had many analytical practices related to referral issues and their complexities. The Qur'anic reference to the pronouns of backbiting, so the researcher traced these phenomena and their evidence in the Holy Qur'an, aiming to clarify their role in enriching the significance and in the coherence and harmony
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe current study aims to examine the experience of female students with disabilities who studying in university in kingdom of Saudi Arabia. To this end, the researcher used semi-structured interview as an instrument to collect the study data which regards as one of the descriptive approach tools. The sample comprised (12) disabled-female students from multidiscipline within both college of arts and college of education. To analyze the collected data, the author utilized a thematic analysis method following six steps as stated by (Braun and Clark, 2006). The findings revealed that disabled students have a high self-confidence which push them forward to take part in activities that hold on campus. Besides, significant variation were shown
... Show MoreThe purpose of this study is to measure the levels of quality control for some crude oil products in Iraqi refineries, and how they are close to the international standards, through the application of statistical methods in quality control of oil products in Iraqi refineries. Where the answers of the study sample were applied to a group of Iraqi refinery employees (Al-Dora refinery, Al-Nasiriyah refinery, and Al-Basra refinery) on the principles of quality management control, and according to the different personal characteristics (gender, age, academic qualification, number of years of experience, job level). In order to achieve the objectives of the study, a questionnaire that included (12) items, in order to collect preliminary inform
... Show MoreAbstract:
One of the important things provided by fuzzy model is to identify the membership functions. In the fuzzy reliability applications with failure functions of the kind who cares that deals with positive variables .There are many types of membership functions studied by many researchers, including triangular membership function, trapezoidal membership function and bell-shaped membership function. In I research we used beta function. Based on this paper study classical method to obtain estimation fuzzy reliability function for both series and parallel systems.
The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.
This world is moving towards knowledge economy which basically depends on knowledge and information. So, the economic units need to develop its financial reporting system which helps to provide useful information in timeliness for investors in accordance with the requirements of the knowledge economy and meets the needs of those investors. This research aims to revealing the reflects of knowledge economy on the approaches of financial reporting and suggesting a financial reporting model in the environment of knowledge economy, depending on combining the value approach with the events approach using database and communication technology and providing useful accounting information for all users regardless of
... Show MoreIn the present study twenty samples of human urine were taken
from healthy male and female with different of: ages, occupation and
place of residence. These samples were collected from the hospital to
measure the concentration of radon gas in human urine by using one
of solid state nuclear track detectors LR-115.
The results obtained of the concentrations of radon in healthy human
urine are varying from 2.12×10-3 Bq.l-1 to 4.42×10-3 Bq.l-1 and
these values are less than the allowed limits 12.3×10-3 Bq.l-1.
The aim of this research is to uncover the science processes included in the teacher’s guide to scientific experiments for science books for grades (first-second) for the intermediate stage, The research sample included all the scientific experiments contained in the teacher’s guide for scientific experiments for the intermediate stage, The researcher used the descriptive and analytical method, and designed an analysis tool, The content of science operations, and verified its validity and consistency, and after using percentages and ranks for statistical treatment, the research reached the following results: The number of practical experiments varies from one class to another in the intermediate stage, where the highest percentage ap
... Show More