Inflammation of the tonsils could be described as acute tonsillitis, mainly due to infection. Recurrent tonsillitis could be defined as 3-7 episodes during the first 3 years of age. Vitamin D, which is a neuro-hormone with pleiotropic biological activities may modulate the immune response by alleviation, and stimulation of Th1 and Th2 cell proliferation, respectively, that influence the stimulation, synthesis, and secretion of both pro and anti-inflammatory cytokines. In this study we aimed to shed light on the levels of vitamin D in children with different episodes of tonsillitis in association with levels of interleukins (TNFα, IL-2, IL-4, IL-10). Blood samples were collected from 48 participants in 3 groups: control, acute tonsillitis (1-2 episodes/year), chronic tonsillitis (more than 7 episodes/year), serum was separated and the levels of Vitamin D, TNFα, IL-2, IL-4 and IL-10 were estimated using ELISA technique. Vitamin D decreased significantly as the episodes of tonsillitis increased, with level of 16.38± 2.41ng/ml in acute and, 14.13± 2.15 ng/ml in chronic tonsillitis as compared to control (30.91± 2.31 ng/ml), while pro-inflammatory cytokines (TNFα and IL-2) significantly increased (46.88± 14.05 and 44.55± 9.24, 1267.25± 111.85 and 1191.72± 121.52 ng/ml, respectively) as compared to control (9.45 and 138.48 ng/ml respectively). Anti-inflammatory (IL-4, IL-10) cytokines in control group were (243.08± 28.72 and 24.27± 1.83 ng/ml, respectively), which increased non-significantly in acute and chronic tonsillitis (302.76± 38.93, 290.12± 44.69 and 28.16± 2.01, 26.29± 1.99 ng/ml, respectively). Significant direct correlation was observed between the levels of vitamin D and anti-inflammatory cytokines in chronic tonsillitis (P<0.05). In conclusion, deficiency of vitamin D may affect the number of episodes of tonsillitis in children by modulation of the secretion of some cytokines.
The dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on leather
... Show MoreThe dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreBy driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root gives invertible model and when the sign is negative means the root gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when
Many biochemical and physiological properties depend on the size of ions and the thermodynamic quantities of ion hydration. The diffusion coefficient (D) of lanthanide (III) ions (Ln+3) in solution assumed (1.558-1.618 ×10−9 m2 s−1) by Einstein–Smoluchowski relation. The association constant (KA) of Ln+3 ions was calculated (210.3-215.3 dm3 mole-1) using the Shedlovsky method, and the hydrodynamic radius calculated (1.515-1.569 ×10−10 m) by the Stokes-Einstein equation. The thermodynamic parameters (ΔGo, ΔSo) also calculated by used suitable relations, while ΔHo, values are obtained from the lit
... Show MoreThe objective of this study was to isolate and identify the asparaginase-producing bacteria, then purify and characterize the enzyme in order to investigate their properties in the future. Fifteen local bacterial isolates were isolated from various sites in the city of Baghdad, identified by conventional morphological and biochemical procedures, and confirmed using vitek 2 methods, and submitted to primary screening processes for asparaginase production. For secondary screening, eight isolates with the greatest yellow zone ability on a specific solid medium were chosen. Bacillus sp. was reported to have the highest enzyme production (7.5 U/mg proteins). After 24 hours of incubation, submerged fermentation yielded optimal conditi
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
Background: Bilastine (BLA) is a second-generation H1 antihistamine used to treat allergic rhinoconjunctivitis. Because of its limited solubility, it falls under class II of the Biopharmaceutics Classification System (BSC). The solid dispersion (SD) approach significantly improves the solubility and dissolution rate of insoluble medicines. Objective: To improve BLA solubility and dissolution rate by formulating a solid dispersion in the form of effervescent granules. Methods: To create BLA SDs, polyvinylpyrrolidone (PVP K30) and poloxamer 188 (PLX188) were mixed in various ratios (1:5, 1:10, and 1:15) using the kneading technique. All formulations were evaluated based on percent yield, drug content, and saturation solubility. The fo
... Show More