Preferred Language
Articles
/
bsj-2452
Gene Expression and Polymorphism of Interleukin-4 in a Sample of Iraqi Rheumatoid Arthritis Patients
...Show More Authors

It was aimed to understand the interleukin-4 (IL-4) role in etio-pathogenesis of rheumatoid arthritis (RA). Two approaches were adopted. In the first one, a quantitative expression of IL4 gene was assessed by reverse transcription-quantitative polymerase chain reaction (RT-qPCR), and such findings were correlated with some demographic, clinical and laboratory parameters, which included gender, duration of disease, disease activity score (DAS-28), rheumatoid factors (RFs), C-reactive protein (CRP) and anti-cyclic citrullinated peptide (ACCP) antibodies. In the second approach, a single nucleotide polymorphism (SNP) of IL4 gene (rs2243250) was inspected by DNA sequencing using specific primers. Fifty-one Iraqi RA patients (22 males and 29 females) were enrolled in the study. They were under therapy, which was a single weekly subcutaneous dose of 25 mg of etanercept (Enbrel) for a period of 3-5 years. The results of gene expression (2-??Ct) revealed an increased expression of IL4 mRNA (Mean ± SEM: 8.247 ± 2.442), especially female patients compared to male patients (11.545 ± 3.928 vs. 3.537 ± 1.530; p = 0.03). The expression was also subjected to variations that were related to clinical and laboratory findings. With respect to IL4 gene SNP, allele and genotype frequencies showed no significant differences between RA patients and controls. In addition, the SNP genotypes had no effect on IL4 gene expression. In conclusion, an up-regulation of IL4 gene expression was observed in RA patients, and it was more pronounced in female than male patients by approximately four folds, while no association between the IL4 SNP alleles or genotypes and RA was observed.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Photovoltaic system DC series arc fault: a case study
...Show More Authors

<p>Photovoltaic (PV) systems are becoming increasingly popular; however, arc faults on the direct current (DC) side are becoming more widespread as a result of the effects of aging as well as the trend toward higher DC voltage levels, posing severe risk to human safety and system stability. The parallel arc faults present higher level of current as compared with the series arc faults, making it more difficult to spot the series arc. In this paper and for the aim of condition monitoring, the features of a DC series arc fault are analyzed by analysing the arc features, performing model’s simulation in PSCAD, and carrying out experimental studies. Various arc models are simulated and investigated; for low current arcs, the heur

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
Controls Scanning on the slippers: a study fiqhiat Comparison
...Show More Authors

 

 

Controls Scanning on the slippers a study fiqhiat Comparison

The subject of this research is an important topic, which is frequently repeated, and people need to know its wisdom, and has made it in front and the preface and three detectives, showed through discussion the meaning of the survey on the socks, its wisdom, its rules and conditions, and the duration of the survey on it, spoiled and reasoned and compared to the doctrinal doctrines, And the most correct statement of words I have concluded with a number of things, as follows:

  1. The need to ensure that the slippers are clean, visible and inwa

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Solving a three dimensional transportation problem using linear programming
...Show More Authors

Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Journal Of Engineering
Methods for Removing Dyes from Polluted Water; A Review
...Show More Authors

Most of the water pollutants with dyes are leftovers from industries, including textiles, wool and others. There are many ways to remove dyes such as sorption, oxidation, coagulation, filtration, and biodegradation, Chlorination, ozonation, chemical precipitation, adsorption, electrochemical processes, membrane approaches, and biological treatment are among the most widely used technologies for removing colors from wastewater. Dyes are divided into two types: natural dyes and synthetic dyes.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (7)
Crossref (2)
Scopus Crossref