It was aimed to understand the interleukin-4 (IL-4) role in etio-pathogenesis of rheumatoid arthritis (RA). Two approaches were adopted. In the first one, a quantitative expression of IL4 gene was assessed by reverse transcription-quantitative polymerase chain reaction (RT-qPCR), and such findings were correlated with some demographic, clinical and laboratory parameters, which included gender, duration of disease, disease activity score (DAS-28), rheumatoid factors (RFs), C-reactive protein (CRP) and anti-cyclic citrullinated peptide (ACCP) antibodies. In the second approach, a single nucleotide polymorphism (SNP) of IL4 gene (rs2243250) was inspected by DNA sequencing using specific primers. Fifty-one Iraqi RA patients (22 males and 29 females) were enrolled in the study. They were under therapy, which was a single weekly subcutaneous dose of 25 mg of etanercept (Enbrel) for a period of 3-5 years. The results of gene expression (2-??Ct) revealed an increased expression of IL4 mRNA (Mean ± SEM: 8.247 ± 2.442), especially female patients compared to male patients (11.545 ± 3.928 vs. 3.537 ± 1.530; p = 0.03). The expression was also subjected to variations that were related to clinical and laboratory findings. With respect to IL4 gene SNP, allele and genotype frequencies showed no significant differences between RA patients and controls. In addition, the SNP genotypes had no effect on IL4 gene expression. In conclusion, an up-regulation of IL4 gene expression was observed in RA patients, and it was more pronounced in female than male patients by approximately four folds, while no association between the IL4 SNP alleles or genotypes and RA was observed.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreIn this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better
The oyster ??????? (planned) (Pallas) of lesions that have entered Iraq recently became spyware severe damage in more than a station from power plants in Iraq, including the power plant in Mussayab Vamahar accumulates in pipes cooling and disrupts their work Vtafrtf heat systems cooling and thereby determiningefficiency and lead to added cost many cleaning or replacement of damaged parts
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MorePresentation of urinary calculus ranges from painful urination to acute retention. Diagnosed by x-ray pelvis and non-contrast CT and removal of stone by various methods is the management. Variety in symptoms, sometimes make clinical diagnosis difficult until radiological investigations confirm it. In this case presentation, initial diagnosis was made of Urethrocutaneous fistula may be due to distal stricture, but on investigating, he was diagnosed as urethral calculus in urethral diverticulum , as the reason for his symptoms
Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show More