Type 2 diabetes mellitus (T2DM) is a chronic disorder that is a serious health concern all over the globe, it is linked to Interleukin-10 (IL-10) single nucleotide polymorphisms (SNPs) at the promoter region. On the other hand, diabetes influences the cellular and humoral immunity predisposing the patient to a variety of opportunistic parasites one of them is Toxoplasma gondii (T. gondii), which may infect any nucleated cell, including pancreatic cells. The purpose of this research was to explore the association of IL-10 genetic polymorphisms with T2DM and latent toxoplasmosis among Iraqi patients with T2DM. Fifty-five and fifty-eight venous blood samples were taken from T2DM patients and age-matched non-diabetic persons, respectively. Sera from all samples had been tested for the presence of anti-toxoplasma antibodies using the Enzyme-Linked Immunosorbent Assay (ELISA). Polymerase chain reaction (PCR) was performed by specific primers and the products were sequenced at Macrogen /Korea. A higher percentage of T. gondii infection was found in T2DM patients (52.1%) and 31.5% of non-diabetic persons. The high frequency of the SNP at position -3952 among T2DM patients, and this is a novel finding. An interesting result, an increased risk of T2DM was observed in carriers of -1082 A/G variants, which was high frequency among studied subjects. The carriers of both -1082 AG+GG and -3952 AG+GG genotypes had a synergistic effect on the risk of type 2 diabetes mellitus significantly. A significant association between T2DM and polymorphisms at positions -1082 A/G and -3952 A/G of the IL-10 gene.
Adipose tissue releases pro- and anti-inflammatory cytokines and hormones such as irisin, visfatin, and interleukin-6, which may be linked to periodontal diseases.
Our study aimed to determine salivary irisin, visfatin, and interleukin-6 levels in gingivitis and periodontitis patients, compare them with healthy periodontal patients, and evaluate the association between these biomarkers.
News are considered the most press arts that supply the target audiences with daily information and events happened inside and outside society since it is formed by depending on its resources which have a deep relation with formal corporations to gain their satisfaction in order to support their authority and spreading their domination by using mass media in editing their viewpoints and achieving wide acceptance among public opinion. In the field of technological development and changing in the fields of politics, society, culture, economics etc. inside Iraqi society and democratic transition help to convert news agenda from independent variation to a fellow variation while in the past the variation of mass media was the independent one
... Show MoreBackground: Background : Patients with non-rheumatic atrial fibrillation have high risk of thromboembolism especially ischemic stroke usually arising from left atrial appendage .Transoesophageal echocardiography provides useful information for risk stratification in these patients as it detects thrombus in the left atrial or left atrial appendage. Objective : This study was conducted at Al-Kadhimiya Teaching Hospital to assess the prevalence of left atrial chamber thrombi in patients with chronic non-rheumatic atrial fibrillation using transoesophageal echocardiography and its clinical significance as well as to verify the superiority of transoesophageal over transthoracic echocardiography in the detection of these abnormalities. Type of
... Show MoreThe changes that have occurred in the business environment and scientific and technological progress, as well as the complexity of administrative problems resulting from its practice of various activities, have led to an increase in the responsibilities entrusted to it, and for the purpose of achieving its strategic objectives, which has made the pillars of corporate governance an inevitable matter required by the nature of modern scientific management of the governorate, the success that companies seek is based on the fertile environment and the dialectical relationship between the individual and the company, and to achieve this success there must be a compatible and harmonious audit environment between the internal and external
... Show MoreLet A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.
Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More