Inflammation of the tonsils could be described as acute tonsillitis, mainly due to infection. Recurrent tonsillitis could be defined as 3-7 episodes during the first 3 years of age. Vitamin D, which is a neuro-hormone with pleiotropic biological activities may modulate the immune response by alleviation, and stimulation of Th1 and Th2 cell proliferation, respectively, that influence the stimulation, synthesis, and secretion of both pro and anti-inflammatory cytokines. In this study we aimed to shed light on the levels of vitamin D in children with different episodes of tonsillitis in association with levels of interleukins (TNFα, IL-2, IL-4, IL-10). Blood samples were collected from 48 participants in 3 groups: control, acute tonsillitis (1-2 episodes/year), chronic tonsillitis (more than 7 episodes/year), serum was separated and the levels of Vitamin D, TNFα, IL-2, IL-4 and IL-10 were estimated using ELISA technique. Vitamin D decreased significantly as the episodes of tonsillitis increased, with level of 16.38± 2.41ng/ml in acute and, 14.13± 2.15 ng/ml in chronic tonsillitis as compared to control (30.91± 2.31 ng/ml), while pro-inflammatory cytokines (TNFα and IL-2) significantly increased (46.88± 14.05 and 44.55± 9.24, 1267.25± 111.85 and 1191.72± 121.52 ng/ml, respectively) as compared to control (9.45 and 138.48 ng/ml respectively). Anti-inflammatory (IL-4, IL-10) cytokines in control group were (243.08± 28.72 and 24.27± 1.83 ng/ml, respectively), which increased non-significantly in acute and chronic tonsillitis (302.76± 38.93, 290.12± 44.69 and 28.16± 2.01, 26.29± 1.99 ng/ml, respectively). Significant direct correlation was observed between the levels of vitamin D and anti-inflammatory cytokines in chronic tonsillitis (P<0.05). In conclusion, deficiency of vitamin D may affect the number of episodes of tonsillitis in children by modulation of the secretion of some cytokines.
Abstract
In light of the great technological development and the emergence of globalization has increased global competition, where it became competitive exercise pressure on all sectors. In light of this companies mast enviorment depend on the means that keeps them on the competitive position through access to information about competitors in order to help them to draw a strategy that will achieve a competitive edge either through excellence or reduce the costs of their products and this means intelligence competitive and reverse engineering that help to gain information on competitors analyze and put of the decision-maker From this point formed the idea of research in the statement of the role of
... Show MoreA first step in this research was to synthesize Schiff's bases(1-3)using an Amoxcilline intensification reaction with different aromatic aldehydes in absolute ethanol. In benzene and refluxing conditions,Schiff's bases were cyclized with succinic and Phthalic anhydride to give a new sequence of 1,3-oxazepine derivatives(4-6) and (7-9),respectively.The last step,cyclization reactions with sodium azide in THF solvent resulted in the formation of [10 and 11], which are supposed to be biologically significant.FT.IR, 1H-NMR and 13C-NMR (for compound 4,7,9, and 11),as well as melting points reported, were used to characterize these prepared compounds ,Bacillus (G+), Staphylococcus (G+), and E.Coli (G-)were screened against these compounds. . To i
... Show MoreThis paper demonstrates an experimental and numerical study aimed to compare the influence of openings of different configurations on the flexural behavior of prestressed concrete rafters. The experimental program consisted of testing six simply supported prestressed concrete rafters; 5 rafters are perforated, and the other one is solid as a reference. All rafters were tested under monotonic midpoint load. The variable which has been investigated in this work was the opening’s configuration (quadrilateral or circular) with the same upper and lower chords depths. The results indicate improvement in the beam flexural behavior using the circular openings compared to the quadrilateral o
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreScams remain among top cybercrime incidents happening around the world. Individuals with high susceptibility to persuasion are considered as risk-takers and prone to be scam victims. Unfortunately, limited number of research is done to investigate the relationship between appeal techniques and individuals' personality thus hindering a proper and effective campaigns that could help to raise awareness against scam. In this study, the impact of fear and rational appeal were examined as well as to identify suitable approach for individuals with high susceptibility to persuasion. To evaluate the approach, pretest and posttest surveys with 3 separate controlled laboratory experiments were conducted. This study found that rational appeal treatm
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreThe present research aims at the following:
- Measure Classroom environment of university Student (research sample)- Measure
Cognitive motive and Reflective Thinking of university Student (research Sample) .
- In order to Know the relationship between the Scores of Classroom environment and
Scores of cognitive motive and Scores of Reflective Thinking of university Student
(research Sample) .
Sample of research consisted of (500) Students for both genders distrivbted upon ten
colleges in Baghdad University , (5) Scientific Colleges , and (5) human Colleges , Sample
was chosen by using radom method Research instruments were three , Prepared by the researcher ,The first is to measure
classroom environme
An annular two-phase, steady and unsteady, flow model in which a conductingfluid flow under the action of magnetic field is concavely. Two models arepresented, in the model one; the magnetic field is perpendicular to the long side ofthe channel, while in the model two is perpendicular to the short side. Also, westudy, to some extent the single-phase liquid flow.It is found that the motion and heat transfer equations are controlled by differentdimensionless parameters namely, Reynolds, Hartmann, Prandtl, and Poiseuilleparameters. The Laplace transform technique is used to solve each of the motion andheat transfer equations. The effects of each of dimensionless parameters upon thevelocity and heat transfer is analyzed.A comprehensive study fo
... Show More