Background: Tumor necrosis factor-alpha (TNF-α) and interleukins play important roles in the pathogenesis of rheumatoid arthritis (RA). Genetic research has been employed to find many of the missing connections between genetic risk variations and causal genetic components. Objective: The goal of this study is to look at the genetic variations of TNF-α and interleukins in Iraqi RA patients and see how they relate to disease severity or response to biological therapy. Method: Using specific keywords, the authors conducted a systematic and comprehensive search to identify relevant Iraqi studies examining the genetic variations of TNF-α and interleukins in Iraqi RA patients and how they relate to disease severity or response to biological therapy. Results: Thirteen studies have looked at TNF-α and interleukin genetic polymorphisms in Iraqi RA patients. Only the IL-2, IL-4, IL-6, IL-17, and IL-23 receptor gene polymorphisms were explored for interleukins; however, the results of studies indicate no association between genetic polymorphism and the severity of RA. Very few researchers examine the correlation between genetic variation and TNF-α inhibitor responsiveness. Numerous studies have been conducted to investigate the genetic variations of the TNF-α promoter. The -308 G/A region in the promotor region was the most studied location.
Dam operation and management have become more complex recently because of the need for considering hydraulic structure sustainability and environmental protect on. An Earthfill dam that includes a powerhouse system is considered as a significant multipurpose hydraulic structure. Understanding the effects of running hydropower plant turbines on the dam body is one of the major safety concerns for earthfill dams. In this research, dynamic analysis of earthfill dam, integrated with a hydropower plant system containing six vertical Kaplan turbines (i.e., Haditha dam), is investigated. In the first stage of the study, ANSYS-CFX was used to represent one vertical Kaplan turbine unit by designing a three-dimensional (3-D) finite element (F
... Show MoreThe mobile phone is widespread all over the world. This technology is one of the most widespread with more than five billion subscriptions making people describe this interaction system as Wireless Intelligence. Mobile phone networks become the focus of attention of researchers, organizations and governments due to its penetration in all life fields. Analyzing mobile phone traces allows describing human mobility with accuracy as never done before. The main objective in this contribution is to represent the people density in specific regions at specific duration of time according to raw data (mobile phone traces). This type of spatio-temporal data named CDR (Call Data Records), which have properties of the time and spatial indications for th
... Show MoreThis article reports the first record of Aenasius arizonensis (Girault, 1915) (Hymenoptera, Encyrtidae) parasitizing the recently introduced species of cotton mealybug, Phenacoccus solenopsis Tinsly (Hemiptera, Psedococcidae) infesting Lantana camara L. (Verbeneceae) as well as other ornamental plants in Baghdad province, Iraq. A short morphological description is also presented.
ABSTRACT Background: Improving the properties of heat- cured and self-cured acrylic resin have been studied by many researchers. However, little studies concerned with visible light cured resin (VLCR) improved through addition of nanofiller are available. The purpose of this study was to evaluate some properties of (VLCR) after addition of SiO2 nanofiller. Materials and Methods: SiO2 nanofiller were added to (VLCR) tray material after being dissolved in tetrahydrofuran (THF) solvent. According to the pilot study 2% SiO2 nanofiller addition exhibited better properties than the other percentages (1%, 3%). The main study conducted involved (100) specimens divided into 5 groups according to the test included. (20) Specimens were selecte
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More