Preferred Language
Articles
/
bijps-579
Evaluation of the Role of Interleukein-2 and Interleukein-4 in the Immunopathogenesis of Steroid Therapy Resistance in Iraqi Asthmatic Patients
...Show More Authors

Interleukins (IL-2 and IL-4) are increased in asthmatics and were reported to induce resistance to steroid therapy in some patients who fail to get benefit from glucocorticoids when used in full dose and for long period of time. In this context, the present study was conducted on Iraqi patients to provide additional laboratory mean, beside the clinical diagnosis, for the decision whether the asthma is steroid sensitive or resistant by monitoring the level of immunoglobulins, complement proteins and interleukins among asthmatic patients (steroid sensitive or resistant) and the possible contribution of other factors like age, sex and environments in the development of steroid resistance. A total number of 55 asthmatics and 28 normal subjects were enrolled in the study. Patients were diagnosed clinically as steroid sensitive (SSA) and steroid resistant (SRA) and blood samples were taken from all subjects included in the study for the measurement of immunoglobulins (IgA, IgG, IgM and IgE), complement proteins (C3 and C4), interleukins (Il-2 and Il-4), and total and differential WBC counts.The results showed no age, sex and residence dependency of acquired steroid resistance, while smoking habit (and may be the atopic allergy) constitute marked predisposing factors. The level of IgA and IgE were high in both SRA and SSA, while IgG level was low in SRA. Complement proteins (C3 and C4) were not differ in asthmatic patients in comparison with control group. The interesting results were those concerning interleukins. The levels of IL-2 and IL-4 were very high in SRA than in SSA. These are parallel with high lymphocyte and neutrophil counts in blood samples of those patients.In conclusion, beside clinical diagnostic features concerning the dose and duration of therapy with glucocorticoids, monitoring the levels of IL-2 and IL-4 could provide additional laboratory diagnostic measures for the convincing decision that asthma is steroid resistant.

Key words: steroid resistant asthma, steroid sensitive asthma, IL-2, IL-4

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (37)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Russian Journal Of Bioorganic Chemistry
A Brief Review on Schiff Base, Synthesis, and Their Antimicrobial Activities
...Show More Authors

View Publication
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Fuel
Biodiesel from batch and continuous oleic acid esterification using zeolite catalysts
...Show More Authors

View Publication
Scopus (86)
Crossref (87)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Energy management and storage systems on electric vehicles: A comprehensive review
...Show More Authors

View Publication
Scopus (56)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Strategic Risk's Variation as a function of Competitive Intelligence Investment - An applied research on some Iraqi's manufacturing Companies –
...Show More Authors

 

ABSTRUCT

          The main aim of this research has been associated with the study of relationship between competitive intelligence and strategic risk, and to deduct their specific trends, which are interpreted as predicted by research hypotheses according to a review of literature including prior studies. The basic theme  of these hypotheses is related to the probability that declining levels of strategic risk and competitive positions of industrial companies is dependent upon the growing capacity to stay ahead of competitors in the market.

    A purposive non-random

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 02 2023
Journal Name
Social Science Journal
An Investigation of Microstructure Analysis for World Health Organizatioan Speeches during Covid-19 Pandemic: Adopted Van Dijk Theory
...Show More Authors

Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Design of PV Solar Energy Generator using MPPT Technique to Control Single Input/Multiple Outputs (DC-DC) Converter
...Show More Authors

The paper presents the design of a system consisting of a solar panel with Single Input/Multiple Outputs (DC-DC) Buck Converter by using Simulink dialogue box tools in MATLAB software package for simulation the system. Maximum Power Point Tracking (MPPT) technique depending on Perturb and Observe (P&O) algorithm is used to control the output power of the converter and increase the efficiency of the system. The characteristics of the MSX-60 PV module is chosen in design of the system, whereas the electrical characteristics (P-V, I-V and P-I curves) for the module are achieved, that is affected by the solar radiation and temperature variations. The proposed design module has been found to be stable for any change in atmospheric tempera

... Show More
View Publication Preview PDF
Crossref (2)
Crossref