Recently, Systemic lupus erythematosus (SLE) was considered as one of the autoimmune diseases that the genetic and environmental factors contributed in the disease etiological profile. According to the environmental factors, infectious agents have been concluded to have a role in the etiology and pathogenesis of SLE. Chlamydia pneumoniae and Mycoplasma pneumoniae are among these infectious agents that have been suggested to be involved in the etiology of SLE. Accordingly, the current study was designed to assess the anti-C. pneumoniae and anti-M. pneumoniae IgG antibody status by enzyme linked immunosorbent assay (ELISA) in the sera of 64 Iraqi SLE females' patients and 32 Iraqi healthy females as controls. The patients' group were distributed into two equal subgroups (32 cases in each group); arthritis and nephritis. The findings revealed that 25% of the total SLE patient’s sera were positive for anti-C. pneumoniae IgG antibody, while such antibody was not detected in controls. The difference was significant (p = 9.8 x 10-4) and associated with OR of 22.1. With respect to M. pneumoniae, 67.7% of SLE patient’s sera were positive for anti-M. pneumoniae IgG antibody while none of control’s sera was positive. The difference was significant (p = 4.0 x 10-9) and the associated OR was 141.1. For both pathogens, a similar profile was observed in arthritis and nephritis SLE patients. These findings may suggest that C. pneumoniae and M. pneumoniae are two pathogens involved in etiology and pathogenesis of SLE.
The aim of this paper is to evaluate the rate of contamination in soils by using accurate numerical method as a suitable tool to evaluate the concentration of heavy metals in soil. In particular, 2D –interpolation methods are applied in the models of the spread the metals in different direction.The paper illustrates the importance of the numerical method in different applications, especially nvironment contamination. Basically, there are many roles for approximating functions. Thus, the approximating of function namely the analytical expression may be expressed; the most common type being is polynomials, which are the easy implemented and simplest methods of approximation. In this paper the divided difference formula is used and extended
... Show MoreThe present paper sheds light on irony as one of the most important and most common linguistic phenomena in modern linguistics, in general ,and in discourse in particular, whether it is (political, literary, journalistic, etc.). When irony is used correctly or positively, it paves the way for the speaker to gain the approval of other parties participating in the dialogue and dissolve barriers between them. It is a simple multi-functional linguistic style and an expression of one’s meaning by using language that normally signifies the opposite according to the context and the situation. Therefore, it is necessary to study its characteristics, define its functions and traces the extent of
... Show MoreIn this study, the sonochemical degradation of phenol in water was investigated using two types of ultrasonic wave generators; 20 kHz ultrasonic processor and 40 kHz ultrasonic cleaner bath. Mineralization rates were determined as a function of phenol concentration, contact time, pH, power density, and type of ultrasonic generator. Results revealed that sonochemical degradation of the phenol conversion was enhanced at increased applied power densities and acidic conditions. At 10 mg/L initial concentration of phenol, pH 7, and applied power density of 3000 W/L, the maximum removal efficiency of phenol was 93% using ultrasonic processor at 2h contact time. Whereby, it was 87% using and ultrasonic cleaner bath at 16h contact time and 150 W
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreConstruction is a hazardous industry with a high number of injuries. Prior research found that many industry injuries can be prevented by implementing an effective safety plan if prepared and maintained by qualified safety personnel. However, there are no specific guidelines on how to select qualified construction safety personnel and what criteria should be used to select an individual for a safety position in the United States (US) construction industry. To fill this gap in knowledge, the study goal was to identify the desired qualifications of safety personnel in the US construction industry. To achieve the study goal, the Delphi technique was used as the main methodology for determining the desired qualifications for constructio
... Show MoreThe method of Similarity of important topics in Arabic Rhetoric has ample evidence in the Qur'an and the Hadith and the words of the Arabs and this study is limited to only the Koran.
There have been Similarity in the Holy Quran on both types : investigative and discretion , but the verses are more Similarity investigative and in verse 49 Similarity investigative and in verse 25.
The rush of Albulageyen and many other examples of Quranic Vmtheloa on Similarity , with a linguistic analysis and return to the origins of the meanings are not properly counted Similarity , Kolvaz cunning , deception , and maliciousness , the bad and ridicule.
This study seeks as much as possible to the statement of this phenomenon and stand on these t
There is an association between the signifier and the signifier. This association shows the eyeball, which acquires a direct presence and whose presence influences the level of production of the hidden connotation. Because the theatrical presentation is a series of auditory-visual functions, these signs are looking for the exploration of their meanings and their evocation to form a complete loop to achieve the association of the above. This is what made the researcher to monitor the abundance of semantic shifts in theatrical presentation as long as the implications of the strategy continue in the game of semantic production with multiple horizons, and the idea in theatrical presentation tolerates multiple readings according to the refere
... Show MoreI often read in Islamic jurisprudence in all chapters as much as possible from divine success, time and health, and everything I read in any of the chapters of jurisprudence, I see divine light, eternal wisdom, and a constitution that does not accept error and alteration, as I looked at the great jurisprudential treasures and this enormous wealth, A person finds in himself helplessness in front of this law, how clear, easy, and accurate it is, and it contains permanent good for man, as it is a religion of mercy, benevolence, and goodness, and among these chapters of jurisprudence is the jurisprudence of the commandment. Of the reasons, in the will, the person has had the opportunity to make up for what he missed of doing good that a pers
... Show MoreThe research aims to identify the impact of the visual teaching strategy by using infographics mathematics achievement for intermediate grade students. The experimental research method was adopted, as the experimental design of two independent and equal groups with a post test was used, whereas the experiment was applied on a sample consisting of (52) male students from first- intermediate grade students in (Al-Haq Al-Mubin intermediate school for Boys) of the General Directorate in Anbar Governorate - Department Education in Fallujah for the academic year (2021-2022), and the research sample was distributed equally on the two research groups, and Division (B) was chosen randomly to be the experimental group, while Division (A) was the cont
... Show More