Preferred Language
Articles
/
_xf7UpEBVTCNdQwC2JRf
The correlation between micro-RNA 146a and IL-17 in the serum of Iraqi patients with cystic echinococcosis
...Show More Authors

داء المشوكات الكيسي (CE) هو مرض وبائي يسبب مرضًا خطيرًا وخسائر اقتصادية في معظم بلدان العالم. MiRNAs هي عامل جيني ضروري لتنظيم الاستجابة المناعية من خلال قدرته على التدخل في التعبير الخلوي ؛ واحد هذه الحوامض النووية الدقيقة -146 أ. هدفت الدراسة الحالية تقييم إذا كان بإمكاننا استخدام microRNA 146a كمؤشر حيوي للكشف عن    CEو تحديد العلاقة بين التعبير الجيني microRNA 146a و IL-17 في مرضى CE.حيث اشتملت الدراسة على 50 مريضًا من CE تم إدخالهم إلى المستشفى في بغداد ، العراق و 50 من الأصحاء. تم جمع المصل  للفترة من ايلول 2022 إلى حزيران 2023 . تراوحت أعمار العينات بين 20 - 55 سنة. بلغت  اعلى نسبة الاصابة بالمشوكات الكيسية عند الاشخاص الذين يعيشون بالمناطق الريفية مقارنة بالذين يعيشون في المدن الحضرية (74.00٪ و 42.00٪) ، وشكلت  الرئة العضو الأكثر إصابة (74٪) ، يليها الكبد (18٪) ، ثم الكبد والرئة معًا (8٪).  لوحظ بان التعبير الجيني لل miRNA-146a  في مرضى CE أعلى بكثير من أعضاء المجموعة الضابطة (4.33 ± 1.01 و 1.00 ± 0.23 على التوالي). هذا كما اظهرت النتائج بان مستوى IL-17  زاد بشكل ملحوظ في امصال المجموعة الضابطة 129.15 ± 4.73 نانوغرام / لتر مقارنة بالمرضى 105.99 ± 5.81 نانوغرام / لتر. الخلاصة: وفقًا للنتائج التي توصلنا إليها ،ارتفاع التعبير الجيني  miRNA-146a  في مصل مرضى CE يمكن ان يعد عاملا حيويا  في تشخيص المشوكات، وهذا  الزيادة تؤثر سلبًا بمستويات IL-17 المنخفضة مما  يؤثر ويتداخل مع الاستجابة الالتهابية لجهاز المناعة وبالنتيجة يسهم في التسبب في CE.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Aeroelastic Behavior of a Wind Turbine Blade by a Fluid -Structure Interaction Analysis
...Show More Authors

In this paper, a numerical model for fluid-structure interaction (FSI) analysis is developed for investigating the aeroelastic response of a single wind turbine blade. The Blade Element Momentum (BEM) theory was adopted to calculate the aerodynamic forces considering the effects of wind shear and tower shadow. The wind turbine blade was modeled as a rotating cantilever beam discretized using Finite Element Method (FEM) to analyze the deformation and vibration of the blade. The aeroelastic response of the blade was obtained by coupling these aerodynamic and structural models using a coupled BEM-FEM program written in MATLAB. The governing FSI equations of motion are iteratively calculated at each time step, through exchanging data between

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Cross-focusing Effect of Two Intense Laser Beams on Electron Plasma Wave Excitation
...Show More Authors

This paper presents the effect of relativistic and ponderomotive nonlinearity on cross-focusing of two intense laser beams in a collisionless and unmagnetized plasma. It should be noted here that while considering the self-focusing due to relativistic electron mass variation, the electron ponderomotive density depression in the channel may also be important. Therefore/these two nonlinearties may simultaneously affect the self-focusing process. These nonlinearities depend not only on the intensity of one laser but also on the second laser. Therefore, one laser beam affects the dynamics of the second beam and hence the process of cross-focusing takes place. The electric field amplitude of the excited electron plasma wave (EPW) has been cal

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Design of a PID-Lead Compensator for a Twin Rotor Aerodynamic System (TRAS)
...Show More Authors

This paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 05 2024
Journal Name
5th International Conference On Biomedical And Health Sciences
Antimicrobial Activity Zinc Oxide ZnO Nanoparticles Against Biofilm Formation of Uropathogenic E. coli
...Show More Authors

Preview PDF
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Is Elective Interval Appendicectomy after Successful Initial Conservative Management of Appendicular Mass Necessary?
...Show More Authors

Background The traditional management of appendicular mass is an initial conservative treatment followed by interval appendectomy. Recently interval appendicectomy has been questioned.
Objective: The purpose of this study was to clarify the need and the role of interval appendicectomy after successful initial conservative treatment.
Method: This is a prospective study conducted in a major hospital in Basra from April 2006 to Septemper2010, included 65 patients with appendicular mass which subsequently proved postinflammmatory (phlegmonous) changes of the appendix were treated conservatively.
Results: Routine interval appendicectomy was not performed and needed after successful treatment in the majority of the patients (84.6%). F

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 10 2020
Journal Name
Diyala Journal Of Engineering Sciences
Finite Element Analysis of Seepage for Hemrin Earth Dam Using Geo-Studio Software
...Show More Authors

Finite Element Approach is employed in this research work to solve the governing differential equations related to seepage via its foundation's dam structure. The primary focus for this reason is the discretization of domain into finite elements through the placement of imaginary nodal points and the discretization of governing equations into an equation system; An equation for each nodal point or part, and unknown variables are solved. The SEEP / W software (program) is a sub-program of the Geo-Studio software, which is used by porous soil media to compensate for the problems of seepage. To achieve the research goals, a study was carried out on Hemrin dam, which located in the Diyala River 100 km northeast of Baghdad, Iraq. Thus, o

... Show More
View Publication
Crossref (12)
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
Preparation of Vaccine against Diabetic Foot Pathogenic Bacteria Using Low Level Diode Laser
...Show More Authors

Background: Since the invention of laser in 1960, lasers have been developed and approved in many fields. Lasers can now be regarded as practical tools with unique properties that have been utilized effectively in several applications in fields of medical and biological sciences.Objectives: The aim of the current study was to preparation of vaccines (live attenuated and killed) by irradiation of the bacteria by the low level diode laser.Methods: six bacterial isolates were isolated from human samples of diabetic foot infections, which used for preparation of vaccines. The experiment was conducted on fifteen adult male rabbits; they were divided into three groups with 5 rabbits each. Blood samples were collected from the marginal ear vein

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Civil Engineering Journal
Post-Fire Behavior of Post-Tensioned Segmental Concrete Beams under Monotonic Static Loading
...Show More Authors

This paper presents a study to investigate the behavior of post-tensioned segmental concrete beams that exposed to high-temperature. The experimental program included fabricating and testing twelve simply supported beams that divided into three groups depending on the number of precasting concrete segments. All specimens were prepared with an identical length of 3150 mm and differed in the number of the incorporated segments of the beam (9, 7, or 5 segments). To simulate the genuine fire disasters, nine out of twelve beams were exposed to a high-temperature flame for one hour. Based on the standard fire curve (ASTM – E119), the temperatures of 300◦C (572◦F), 500◦C (932◦F), and 700◦C (1292◦F) were adopted. Consequently,

... Show More
Crossref (1)
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Dynamic Response of a Nonlinear Fabry-Perot Etalon for Various Medium Response Times
...Show More Authors

     In this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication