Background: Tumor necrosis factor-alpha (TNF-α) and interleukins play important roles in the pathogenesis of rheumatoid arthritis (RA). Genetic research has been employed to find many of the missing connections between genetic risk variations and causal genetic components. Objective: The goal of this study is to look at the genetic variations of TNF-α and interleukins in Iraqi RA patients and see how they relate to disease severity or response to biological therapy. Method: Using specific keywords, the authors conducted a systematic and comprehensive search to identify relevant Iraqi studies examining the genetic variations of TNF-α and interleukins in Iraqi RA patients and how they relate to disease severity or response to biological therapy. Results: Thirteen studies have looked at TNF-α and interleukin genetic polymorphisms in Iraqi RA patients. Only the IL-2, IL-4, IL-6, IL-17, and IL-23 receptor gene polymorphisms were explored for interleukins; however, the results of studies indicate no association between genetic polymorphism and the severity of RA. Very few researchers examine the correlation between genetic variation and TNF-α inhibitor responsiveness. Numerous studies have been conducted to investigate the genetic variations of the TNF-α promoter. The -308 G/A region in the promotor region was the most studied location.
Background: Urolithiasis and hypertension are prevalent and clinically significant conditions in the Middle East, both influenced by shared metabolic and environmental risk factors. Understanding the potential association between them is important for guiding prevention strategies. Objective: To explore the relationship between urolithiasis and hypertension in a sample of Iraqi adult patients. Methods: A cross-sectional observational study was conducted at Alkindy Teaching Hospital, Baghdad, from September 2024 to March 2025. Participants included 237 patients with confirmed urinary tract stones and 244 controls confirmed to be stone-free, matched for age and sex. Exclusion criteria included secondary hypertension, chronic kidney di
... Show MoreDBN Rashid, Asian Quarterly: An International Journal of Contemporary Issue, 2018
Simulation of free convection heat transfer in a square enclosure induced by heated thin plate is represented numerically. All the enclosure walls have constant temperature lower than the plate’s temperature. The flow is assumed to be two-dimensional. The discretized equations were solved stream function, vorticity, and energy equations by finite difference method using explicit technique and Successive Over- Relaxation method. The study was performed for different values of Rayleigh number ranging from 103 to 105 for different angle position of heated thin plate(0°, 45°, 90°). Air was chosen as a working fluid (Pr = 0.71). Aspect ratio of center of plate to the parallel left wall A2
... Show MoreThe main objective of resources management is to supply and support the site operation with necessary resources in a way to achieve the required timing in handing over the work as well as to achieve the cost-realism within the budget estimated. The research aims to know the advantage of using GIS in management of resources as one of the new tools that keep pace with the evolution in various countries around the world also collect the vast amount of spatial data resources in one environment easily to handled and accessed quickly and this help to make the right decision regarding management of resources in various construction projects. The process of using GIS in the management and identification of resources is of extreme importance in t
... Show MoreA new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More