Rheumatoid arthritis (RA) is a systematic autoimmune disorder with chronic inflammation changes of unknown etiology. Various synovial inflammatory and proliferative alterations may contribute to the cartilaginous tissues and invasive bony tissues, leading to destructive joints and malformed bones. This disease is mostly due to infective microorganisms or genetic susceptibility causing immune system disturbances through triggering both T-cells and B-cells. Furthermore, different immune cells may secret cytokines, which are responsible for some RA pathogenesis activity. From ninety individuals, serum sample was collected; thirty of them were normal and sixty cases were patients with RA attended a privet medical clinic at Tikrit city from May 2019 to November 2019. Age, in both patients and control groups, ranged between (18-50) years, they had assay of Interleukin-1 (IL-1), Interleukin-6 (IL-6), Interleukin-10 (IL-10), Tumor necrosis factor (TNF)-α, Leptin, Adiponectin, and C-reactive protein. The present study shows that (IL-1, Leptin, and CRP) levels were higher in Rheumatoid Arthritis patients than control, while (IL-6, IL-10, TNFα, and ADP) levels were lower; therefore, cytokines can play an essential role in RA pathogenesis. The current study may bring attention to adiponectin and leptin for their roles in the pathogenesis of RA. Special consideration was devoted to those proteins, which act on cells associated with RA, also for possible usage of these protein levels as potential biomarkers for the disease activity and therapeutic response.
ABSTRACT This paper has a three-pronged objective: offering a unitary set of semantic distinctive features to the analysis of nominal “hatred synonyms” in the lexicon of both English and Standard Arabic (SA), applying it procedurally to test its scope of functionality crosslinguistically, and singling out the closest noun synonymous equivalents among the membership of the two sets in this particular lexical semantic field in both languages. The componential analysis and the matching procedures carried have been functional in identifying ten totally matching equivalents (i.e. at 55.6%), and eight partially matching ones (i.e. at %44.4%). This result shows that while total matching equivalences do exist in the translation of certain Eng
... Show MoreMusic and singing are always associated with the movement of society and the emergence of cultural and artistic activities other.
The social and political transformations of the 1930s helped to disseminate the study Music and music in the city of Baghdad and across Iraq This is the beginning of a new era of musical art alongside other arts.
While achieving musical arts A new step was advanced by publishing a technical study among the younger generation they were looking for to contribute to the musical field On the other hand, the city of Baghdad during the period of research many musical and musical performances Egyptian teams have provided many artistic activities and events which have had a significant impact on the development
This paper describes the geotechnical properties of Al-Ammarah soil of Ammarah city in Messan Governorate-southern parts of Iraq. Data and other information taken from numbers of geotechnical reports that performed under the supervision of Consulting Engineering Bureau of Baghdad University. This research is devoted to study the correlation between different physical properties such as (LL, PI, LI, n,t, e) with different mechanical properties such as (qu, cc, cs, SPT). The correlation is verified using simple regression analysis. From the regression results it was found that there is direct correlation between different parameters. By using the correlation-with some information- preliminary investigation stages and studies of any s
... Show MoreThe main aim of the current research is to focus the light on some bacterial contamination on cracked eggshell and egg content plus studying the sensitivity of these bacterial isolates to antibiotics. For this purpose, a total of 50 eggs were collected from the markets in Baghdad city (Iraq) and examined for bacterial isolation from cracked eggshells and from the egg contents. The bacterial isolates were cultured and purified then transferred to a specific media to study its sensitivity against antibiotics. The results revealed that bacteria isolated from both cracked eggshells (46%) and egg contents (44%). The bacteria isolated include E. coli, Staphylococcus, Enterococcus faecalis, Enterobacter and Pseudomonas. The results of antibiotic s
... Show MoreThe formal diversity in designs is achieved by creating shapes and lines with a distinct movement pattern, which are preceded by mental processes. The greatest source of diversity in design in general and industrial design in particular is the creation of multiple directions for the completion of designs and the diversification of intellectual proposals for the design idea. The human activity that takes place around us in various fields of life takes place due to the diversity of movement in the form of the design product and its effectiveness through the dynamic diversity in the form, which differs in the methods of designing and showing it. He invents material value as a distinct artistic product that he owns A specific form or system
... Show MoreSorting and grading agricultural crops using manual sorting is a cumbersome and arduous process, in addition to the high costs and increased labor, as well as the low quality of sorting and grading compared to automatic sorting. the importance of deep learning, which includes the artificial neural network in prediction, also shows the importance of automated sorting in terms of efficiency, quality, and accuracy of sorting and grading. artificial neural network in predicting values and choosing what is good and suitable for agricultural crops, especially local lemons.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More