Background: Tumor necrosis factor-alpha (TNF-α) and interleukins play important roles in the pathogenesis of rheumatoid arthritis (RA). Genetic research has been employed to find many of the missing connections between genetic risk variations and causal genetic components. Objective: The goal of this study is to look at the genetic variations of TNF-α and interleukins in Iraqi RA patients and see how they relate to disease severity or response to biological therapy. Method: Using specific keywords, the authors conducted a systematic and comprehensive search to identify relevant Iraqi studies examining the genetic variations of TNF-α and interleukins in Iraqi RA patients and how they relate to disease severity or response to biological therapy. Results: Thirteen studies have looked at TNF-α and interleukin genetic polymorphisms in Iraqi RA patients. Only the IL-2, IL-4, IL-6, IL-17, and IL-23 receptor gene polymorphisms were explored for interleukins; however, the results of studies indicate no association between genetic polymorphism and the severity of RA. Very few researchers examine the correlation between genetic variation and TNF-α inhibitor responsiveness. Numerous studies have been conducted to investigate the genetic variations of the TNF-α promoter. The -308 G/A region in the promotor region was the most studied location.
The objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).
A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio
The objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).
A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio
The current research aimed to identify the cognitive-behavioral therapy on people with depression, through the following hypothesis (there are no statistically significant differences in the sample before and after cognitive-behavioral therapy). The importance of research is highlighted through the use of cognitive-behavioral therapy, to be used in treating depression, anxiety and fears by health institutions. It is also considered as a reference for psychological studies related to this topic to be added to our libraries that already suffer from a scarcity of this type of resources. The cognitive-behavioral therapy was used in the treatment of five male subjects.
The study revealed the existence of statistically significant diff
... Show MoreA series of coumarin derivatives linked to amino acid ester side chains were synthesized and evaluated of their antibacterial and antifungal activity. The coumarin derivatives was alkylated by the ethyl bromoacetate and then using potassium carbonate to get alkylated hymecromone. Conventional solution method for amide bond formation was used as a coupling method between the carboxy-protected amino acids with acetic acid side chain of coumarin derivatives. The DCC/ HOBt coupling reagents were used for peptide bond formation. The proposed analogues were successfully synthesized and their structural formulas were consistent with the proposed struct
... Show MoreA series of new compounds including p-bromo methyl pheno acetate [2]. N-( aminocarbonyl)–p-bromo pheno acetamide [3] , N-( aminothioyl) -p-bromo phenoacetyl amide [4], N-[4-(p-di phenyl)-1,3-oxazol-2-yl]-p-bromopheno acetamide [5],N-[4-p-di phenyl]-1,3-thiazol-2-yl-p-bromo phenoacet amide [6], p-bromopheno acetic acid hydrazide [7] , 1-N-(p-bromo pheno acetyl)-1,2-dihydro-pyridazin-3,6- dione [8], 1-N-(p-bromo pheno acetyl)-1,2-dihydro-phthalazin-3,8- dione[ 9], 1-(p-bromo pheno acetyl)-3-methylpyrazol-5-one [10] and 1-(p-bromo phenol acetyl)- 3,5-dimethyl pyrazole [11] have been synthesized. The prepared compounds were characterized by m.p.,FT-IR and 1H-NMR spectroscopy. Also ,the biological activity was evaluated .
The plant Zizyphus spina-christa grows wildly in the middle and southern of Iraq locally named Nabag. In this study the antibacterial activity of several different plant extract (alcoholic hot and cold extract 80%, aqueous hot and cold extract) was tested against some gram negative bacteria that related to Enterobacteriacea as follow; Pseudomonas aeruginosa, Escherchia coli Proteus mirabilis, Serratia mercesence,. Aeromonas sp, Klebsiella pneumoniae ,Shigella sp, Salmonella enteritidis (134), S. typhi(97), S. typhimurium (300) , S. typhi, . The results showed that efficient method of extract was alcoholic hot extract from other extract methods that are used in this study. The detection of active compound in crude extracts of the leaves show
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based
... Show More