داء المشوكات الكيسي (CE) هو مرض وبائي يسبب مرضًا خطيرًا وخسائر اقتصادية في معظم بلدان العالم. MiRNAs هي عامل جيني ضروري لتنظيم الاستجابة المناعية من خلال قدرته على التدخل في التعبير الخلوي ؛ واحد هذه الحوامض النووية الدقيقة -146 أ. هدفت الدراسة الحالية تقييم إذا كان بإمكاننا استخدام microRNA 146a كمؤشر حيوي للكشف عن CEو تحديد العلاقة بين التعبير الجيني microRNA 146a و IL-17 في مرضى CE.حيث اشتملت الدراسة على 50 مريضًا من CE تم إدخالهم إلى المستشفى في بغداد ، العراق و 50 من الأصحاء. تم جمع المصل للفترة من ايلول 2022 إلى حزيران 2023 . تراوحت أعمار العينات بين 20 - 55 سنة. بلغت اعلى نسبة الاصابة بالمشوكات الكيسية عند الاشخاص الذين يعيشون بالمناطق الريفية مقارنة بالذين يعيشون في المدن الحضرية (74.00٪ و 42.00٪) ، وشكلت الرئة العضو الأكثر إصابة (74٪) ، يليها الكبد (18٪) ، ثم الكبد والرئة معًا (8٪). لوحظ بان التعبير الجيني لل miRNA-146a في مرضى CE أعلى بكثير من أعضاء المجموعة الضابطة (4.33 ± 1.01 و 1.00 ± 0.23 على التوالي). هذا كما اظهرت النتائج بان مستوى IL-17 زاد بشكل ملحوظ في امصال المجموعة الضابطة 129.15 ± 4.73 نانوغرام / لتر مقارنة بالمرضى 105.99 ± 5.81 نانوغرام / لتر. الخلاصة: وفقًا للنتائج التي توصلنا إليها ،ارتفاع التعبير الجيني miRNA-146a في مصل مرضى CE يمكن ان يعد عاملا حيويا في تشخيص المشوكات، وهذا الزيادة تؤثر سلبًا بمستويات IL-17 المنخفضة مما يؤثر ويتداخل مع الاستجابة الالتهابية لجهاز المناعة وبالنتيجة يسهم في التسبب في CE.
Background: Chronic suppurative otitis media (CSOM) is the result of an initial episode of acute otitis media and is characterized by a persistent discharge from the middle ear through a tympanic perforation for at least 2 weeks duration. It is an important cause of preventable hearing loss, particularly in the developing world.Objective: To get an overview on the bacterial ear infection profile in general and to assess the antibiotic resistance of Pseudomonal infection (PS) particularly since it is usually the commonest infection to cause otitis media and the most difficult to treat due to the problem of multi drug resistance..Methods: A cross sectional study was done which included 405 patients of CSOM patients, 196 (48%) case were mal
... Show MoreThis study aimed to evaluate serum levels of steroid hormones and human chorionic gonadotropin (hCG) hormone in preeclamptic Iraqi pregnancies compared to those of healthy pregnancies.This study enrolled 120 pregnant women, divided into four groups:1. 30 healthy pregnant women.2. 37 pregnant women with mild preeclampsia3. 53 pregnant women with severe preeclampsia4. 90 pregnant women with preeclampsia Preeclamptic women and their severe cases but not mild cases had significantly (P<0.01) increased levels of serum hCG as compared with healthy pregnancies. By contrast, sera levels of estradiol were significantly (P<0.01) decreased in total preeclamptic groups and their severe cases but not in mild group as compared to healthy pregnant wome
... Show MoreObjective: To assess the role of tumour necrosis factor alpha level and genotyping in susceptibility to leishmaniasis.Method: The case-control study was conducted from March to July 2021 at Baqubah Teaching Hospital, Diyala, Iraq,and comprised patients of cutaneous leishmaniasis in group A and healthy controls in group B. The serum level andsingle nucleotide polymorphisms of tumour necrosis factor-alpha rs41297589 and rs1800629 were compared betweenthe groups. Data was analysed using SPSS 28.Results: Of the 150 subjects, there were 75(50%) in group A; 39(52%) males and 36(48%) females with mean age23.91±13.14 years. The remaining 75(50%) subjects were in group B; 38(50.7%) males and 37(49.3%) females withmean age 22.84±4.35 years.
... Show MoreThe expression of MUC5AC has been associated with the loss of the differentiation, TNM system, and nodal metastasis, in many cancers including gastric carcinoma (GC).Objective: To evaluate whether the MUC5AC could be used as a predictor in patients with GC and to assess the correlation between the expression of MUC5AC& the clinicpathological parameters as age, sex, histopathological subtypes, grade and stage of the tumor. This is a retrospective study conducted on 60 randomly selected patients (30 normal vs 30 GC), at the Pathology Department of the Gastroenterology and Hepatology Teaching Hospital&some private laboratories. They were collected and diagnosed during the period 2014-2018. Histological sections were stained with H&E and IHC st
... Show MoreAt present, the ability to promote national economy by adjusting to political, economic, and technological variables is one of the largest challenges faced by organization productivity. This challenge prompts changes in structure and line productivity, given that cash has not been invested. Thus, the management searches for investment opportunities that have achieved the optimum value of the annual increases in total output value of the production line workers in the laboratory. Therefore, the application of dynamic programming model is adopted in this study by addressing the division of investment expenditures to cope with market-dumping policy and to strive non-stop production at work.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More