Rheumatoid arthritis (RA), is an autoimmune, and inflammatory disease that is closely related to the destruction of cartilage and bone. DC-SIGN are important types of C-type lectin receptors (CLRs), expressed on dendritic cells and macrophages, and have a central role in regulating innate and adaptive immunity, function as pattern recognition receptors, and as cell adhesion molecules. Recent evidence has demonstrated that DC-SIGN is involved in the pathophysiological of chronic inflammation, so DC-SIGN has been linked to several autoimmune and may play an essential indicator in the pathogenesis and progression of RA. Therefore, the purpose of this study is to determine the serum level of DC-SIGN in RA patients, as well as the level of DC-SIGN based on demographic characteristics. Fifty Iraqi RA patients were enrolled in the study, and a control sample of 38 healthy individuals (ascertain by laboratory and clinical tests) were included and matched by gender, age, and ethnicity with the patients. The DC-SIGN concentration was calculated in the patients’ serum and compared to control using the ELISA assay and the results revealed significantly increased serum level of DC-SIGN (12.047 ± 1.114 vs. 6.863 ± 0.806 ng/ml) was recorded in RA patients compared to controls. When correlating results, it was shown that the concentration of DC-SIGN in the serum did not record a significant difference between gender and age, as well as the blood groups. To determine the impact of the therapeutic status in RA patients on the DC-SIGN level, it was found that the concentration of DC-SIGN level was higher in untreated patients compared to treated patients. Regarding viral infection, when an investigation was conducted in RA patients infected with SARS-CoV-2, the serum level of DC-SIGN in RA patients with COVID-19 showed no change in concentrations compared to uninfected RA patients.
Objective: This research aimed to study the relation between maximal bite force (MBF) and maximum mouth opening among 12-year-old school children. Methods: In this cross-sectional study, a total of 400 children aged 12 years (194 boys and 206 girls) were examined. The MBF for the right and left side, as well as the anterior region, were evaluated for all children. The MMO was measured using an electronic digital caliper. To analyze the data path analysis method was used. Results: Boys showed a higher MMO of 48.797 ± 6.500 than girls (46.710 ± 5.926 mm). The MMO increased with increasing MBF, with significant differences between females and males. Conclusion: The MMO was higher in boys than in girls. Gender plays a significant ro
... Show MoreThe need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services
... Show MoreTicks (Acari: Ixodidae) are ectoparasites that infest livestock in every geographic region of the world and are vectors of several viral, bacterial, and protozoan pathogens to both animals and humans. There is little information is available is about tick presence in Buffalo Bubalus bubalis (Linnaeus, 1758) (Artiodactyla, Bovidae) in Iraq. The current study determined the species of ticks parasitizing Buffalo in some central and southern regions included: Baghdad (Al Fathelia), Karbala (Al-Hussainia), Wasit (Kut and Al-Suwairah), Al-Qadisia (Al- Diwaniyah, Al- Saniya, Al-Mihnawea, and Afak), Thi Qar (Al-Nasiriyah and Al-chibayish), Missan (Amara and Qalaat Salih) and Basrah (Al-Haretha, Al-Madena and Al-Deer). A total of 150 Buffal
... Show MoreThis review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil
... Show MoreCommercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More