Objective: To Evaluate the Roley of Cytotoxic T-Lymphocytek antigen 4 Polymorphism and soluble immune checkpoint level (PD-1,PDL-1 and CTLA-4 ) in SARS-Cov-2 patients. Methods: Fromt October 2020 to April 2021, the currentk study was conducted in Baghdad-Iraq. Ninety patients with Confirmatory SARS-Cov-2 by PCR were inclusion in the study, and they were seeking treatment at Medical City in Baghdad's Teaching Hospital (BTH). Patients with SARS-Cov-2 were divided into two groups: those with Sever SARS-Cov-2 symptom and those with mild - moderate SARS-Cov-2 symptoms (cross sectional study. Patients with another form of autoimmune illness, malignant, diabetes, under the age of 18 and pregnant women were excluded. Results: Data regarding serum level of CTLA-4f, PD-1j and PD-L1 in mild-moderate and severe covid19 patients were found to be non-normally distributed. The median serum level of CTLA-4, PD-1 and PD-L1 mild-moderate groups were much lower than that of severe cases with highly significant differences. Age demonstrated a positive significant correlation with each of CTLA-4 (r= 0.281, p= 0.007), PD-1 (r= 0.282, p= 0.007) and PD-L1 (r= 0.219, p= 0.039). Soluble CTLA-4 had a positive significant correlation with each of PD-1 (r=0.714, p<0.001) and PD-L1 (r= 0.602, p<0.001). Allele specific of CTLA-4(+49G/A) PCR was used for gene amplification and genotyping under Gel electrophoresis of PCR products revealed that this SNP had three genotypes in mild/moderate and severe cases of COVID-19. These were GG, GA and AA. The wild homozygous genotype (AA) was more frequent among severe group than mild-moderate group with a significant difference. Conclusion: Soluble Immune checkpoint markers are significantly increased in patients with covoid-19 in severe cases and soluble immune checkpoint markers are positively significant correlation with age and The genotyping CTLA-4(+49G/A) gene SNP (AG and GG by allele specific PCR) was significantly higher in mild-moderate covid-19 cases in which may indicate that this SNP mostly protective with good prognosis. Keywords: Immune checkpoint, CTLA-4, PD1, PDL-1 and COVID-19.
This study aims to clarify areas of using information technology in accounting and its impact on the profession of auditors by reviewing the concept, types, areas and the importance of information technology and its implications on the audit profession as well as to clarify the extent of contribution of information technology in developing of procedures of the audit profession and what its requirement, also this study aims to enhance the theoretical side by identifying the views of a sample of auditors in Arab countries selected (Iraq, Syria, Jordan), for the extent of using of information technology in their work and level of their perception for the importance of that
Praise be to God, who taught with the pen, taught man what he did not know, and may blessings and peace be upon our master Muhammad, may God bless him and grant him peace, and upon all his family and companions.
As for after......
The science of financial transactions is one of the important topics that Muslims must need at all times and places, due to its great importance in clarifying the ruling of the Shari’ah on contemporary financial issues.
The jurists, may God have mercy on them, have spoken about financial issues in all their aspects in detail, as in the Book of Sales, whether in terms of the validity of the sale, its invalidity, or its invalidity, i.e., the invalidity of the sale. Among these issues is the issue of th
Background: Breast cancer is the commonest type of malignancy worldwide and in Iraq. It is a serious disease that affects the general health and cause systemic changes that affect the physical and chemical properties of saliva leading to adverse effects on oral health. This study was conducted toassess the tumor marker CA15-3 and selected elements in saliva and their relation to oral health status among breast cancer patients compared to control group. Materials and Methods: The total sample consisted of 60 women aged 35-45 years. 30 women were newly diagnosed with breast cancer before taking any treatment and surgery (study group) and 30 women without clinical signs and symptoms of breast cancer as a control group. Dental caries was record
... Show MoreAbstract Rasha Hameid Jehad Baghdad University Background: The high reactivity of hydrogen peroxide used in bleaching agents have raised important questions on their potential adverse effects on physical properties of restorative materials. The purpose of this in vitro study was to evaluate the effect of in-office bleaching agents on the microhardness of a new Silorane-based restorative material in comparison to methacrylate-based restorative material. Materials and method: Forty specimens of Filtek™ P90 (3M ESPE,USA) and Filtek™ Supreme XT (3M ESPE, USA) of (8mm diameter and 3m height) were prepared. All specimens were polished with Sof-Lex disks (3M ESPE, USA). All samples were rinsed and stored in incubator 37˚C for 24 ho
... Show MoreThis book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
MR Younus…, 2020 - Cited by 2
The present paper is a qualitative descriptive study. It aims to examine the macro-cultural schemata addressing the concept of violence against women in Iraq from a cognitive linguistic point of view. To meet this objective, a number of Iraqi social caricatures have been selected from two popular and active Iraqi caricaturists, Odeh Al-Fahdawi and Nasser Ibrahim. The selection and the analysis of data have been achieved following the validity and reliability procedures and the ethical considerations. To meet this objective, Sharifian’s Model (2011) of Cultural Schemata has been adopted in data analysis. The study has concluded that the macro-cultural schemata regarding the concept of violence in the selected panels reveals that violenc
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More