Cytokines are signaling molecules between inflammatory cells that play a significant role in the pathogenesis of a disease. Among these cytokines are interleukins (ILs) 17A and 33, and accordingly, the current case-control study sought to investigate the role of each of the two cytokines in the risk of developing multiple sclerosis (MS). Sixty-eight relapsing-remitting MS (RRMS) Iraqi patients and twenty healthy individuals (control group) were enrolled. Enzyme linked immunosorbent assay (ELISA) kits were used to determine serum levels of IL-17A and IL-33. Results revealed that IL-17A and IL-33 levels were significantly higher in MS patients than in controls (14.1 ± 4.5 vs. 7.5 ± 3.8 pg/mL; p < 0.001 and 65.3 ± 16.3 vs. 49.3 ± 20.0 pg/mL; p < 0.001, respectively). Receiver operating characteristic (ROC) curve analysis demonstrated that IL-17A was a very good predictor of MS (area under curve [AUC] = 0.869; 95% CI = 0.779 - 0.960; p < 0.001; cut-off value = 10.2 pg/mL; sensitivity = 80.8%; specificity = 75.0%). A similar prediction was presented by IL-33, but the AUC value was lower (AUC = 0.762; 95% CI = 0.63 - 0.89; p < 0.001; cut-off value = 56.4 pg/mL; sensitivity = 70.6%; specificity = 70.0%). Multinomial logistic regression analysis confirmed the significance of IL-17A and IL-33 in MS risk, and under three models of analysis, the estimated odds ratios for IL-17A (1.50, 1.49 and 1.50, respectively) and IL-33 (1.05, 1.05 and 1.06) were above 1.0. Patients stratified by gender (male and female), expanded disability status scale (EDSS: < 3 and ≥ 3) or medication (pre- and post-medication) showed no significant differences in serum levels of IL-17A and IL-33 for each stratum. However, with regard to response to medication, it was found that responding patients showed significantly higher levels of IL-33 than non-responders (70.9 ± 12.2 vs. 57.2 ± 18.2 pg/mL; p = 0.018). This difference was not observed when considering IL-17A. Pearson correlation analysis between IL-17A and IL-33 revealed that both cytokines were not significantly correlated. In conclusion, the study indicated that IL-17A and IL-33 were up-regulated in serum of MS patients, and this up-regulation was not influenced by age, gender, EDSS or medication status, but the elevated level of IL-33 was more pronounced in patients who responded to medication.
The study aims to determine the organizational monitoring mechanism in target organization as well as knowing the suffocation of work. The study depends on a questionnaire as a tool of collecting data on distributed random sample involved (45) person from different levels in manufacturing isphelt Dohuk. The study depends on some hypothesis, the most significant one is that there is not impact of organizational monitoring of suffocation especially on the target organization.
In this research tri metal oxides were fabricated by simple chemical spray pyrolysis technique from (Sn(NO3)2.20 H2O, Zn(NO3)2.6 H2O, Cd(NO3)2.4 H2O) salts at concentration 0.1M with mixing weight ratio 50:50 were fabricated on silicon substrate n-type (111). (with & without the presence of grooves by the following diemensions (20μm width, 7.5μm depth) with thickness was about ( 0.1 ±0.05 µm) using water soluble as precursors at a substrate temperature 550 ºC±5, with spray distance (15 cm) and their gas sensing properties toward H2S gas at different concentrations (10,50,100,500 ppmv) in air were investigated at room te
... Show MoreThis research aims to measure the discrepancy between the accounting income which is prepared according to generally accepted accounting principles and the tax income that is being prepared according to the rules and tax laws, and find out the most important differences that arise between incomes.The research found the most important to the following conclusions:1.Faces determining the tax base for companies subject to income challenges related to the weakness of the efficiency and the possibility of technical angel tax and its ability to examine the financial statements submitted to the tax administration tax.2.That the tax system in Iraq does not comply with accepted accounting principles generally accepted.The research recommends the
... Show MoreGod Almighty set out to build mosques, and he commanded to seek their architecture, and the competition for them, and allocate them with types of worship that are not valid in others, and to preserve their sanctity and not to be degraded and taken for mundane purposes and special benefits, because they are considered one of the most prominent features of Islam and the rituals of Islamic society, so this research came to show the rule Sharia in various and contemporary issues that are needed by the imams of the mosques, their rulers, and those responsible for them. Among the issues in which they have examined comparative juristic research and reached the most correct opinion are:
Building mosques over or under buildings and factories i
0
The study aims to test the relationship of work pressure to its dimensions (role conflict, ambiguity of role, workload and nature of work) as an independent variable and its effect on organizational alienation by its dimensions (disability, lack of power, indifference, animosity, social isolation and self-alienation) (Restraint and confidence in negation, initiative, adaptation and living conscience) as a mediator variable, in some faculties of Baghdad University of Science (Medicine and Engineering) and Humanity (Education and Literature). The data was collected on the practical side, which was applied randomly (306) of the teachers and teachers of the colleges (56) items, which included the main research variables
... Show MoreThe novel is the revelation of the attitudes of every age. And the writers do not know the winner of their stroke to express these events، The research has been working on a descriptive-analytical approach based on the American Comparative School، Al-Shahez's novel explores the work of the nobly and the film by Hamoun by Dariush Mehrjui By relying on the main characters of these two narratives, they depict a picture of Egypt and Iran From the symbolic lines of these works. In fact, the authors of this research have tried to initiate the introduction and analysis of these two works In fact, the authors of this research have tried to initiate the introduction and analysis of these two works.
The results of the research show that
... Show MoreThe first section of this research discussed the manner of the research from many sides like the problem it faces, importance of it , its targets ,boundaries, the way to collect and get information's and its assumption.
When the second chapter discussed the press – manufacturing and the development ,importance and types of newspapers, also its merits and weaknesses.
The third chapter talked about the scientific side and how to choose an assumption for the research . as it talked also about the apparent honest and stability tests that help in analyzing the research until getting results and so the right assumption for the research will be chosen.
And finally, the fourth chapter put highlight on the be
... Show MoreThis research develops a new method based on spectral indices and random forest classifier to detect paddy rice areas and then assess their distributions regarding to urban areas. The classification will be conducted on Landsat OLI images and Landsat OLI/Sentinel 1 SAR data. Consequently, developing a new spectral index by analyzing the relative importance of Landsat bands will be calculated by the random forest. The new spectral index has improved depending on the most three important bands, then two additional indices including the normalized difference vegetation index (NDVI), and standardized difference built-up index (NDBI) have been used to extract paddy rice fields from the data. Several experiments being
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More