Collagen triple helix repeat containing-1 (CTHRC1) is an essential marker for Rheumatoid Arthritis (RA), but its relationship with pro-inflammatory, anti-inflammatory, and inflammatory markers has been scantily covered in extant literature. To evaluate the level of CTHRC1 protein in the sera of 100 RA patients and 25 control and compare levels of tumour necrosis factor alpha (TNF-α), interleukin 10 (IL-10), RA disease activity (DAS28), and inflammatory factors. Higher significant serum levels of CTHRC1 (29.367 ng/ml), TNF-α (63.488 pg/ml), and IL-10 (67.1 pg/ml) were found in patient sera as compared to that in control sera (CTHRC1 = 15.732 ng/ml, TNF-α = 33.788 pg/ml, and IL-10 = 25.122 pg/ml). There was no significant correlation be
... Show MoreCollagen triple helix repeat containing-1 (CTHRC1) is an essential marker for Rheumatoid Arthritis (RA), but its relationship with pro-inflammatory, anti-inflammatory, and inflammatory markers has been scantily covered in extant literature. To evaluate the level of CTHRC1 protein in the sera of 100 RA patients and 25 control and compare levels of tumour necrosis factor alpha (TNF-α), interleukin 10 (IL-10), RA disease activity (DAS28), and inflammatory factors. Higher significant serum levels of CTHRC1 (29.367 ng/ml), TNF-α (63.488 pg/ml), and IL-10 (67.1 pg/ml) were found in patient sera as compared to that in control sera (CTHRC1 = 15.732 ng/ml, TNF-α = 33.788 pg/ml, and IL-10 = 25.122 pg/ml). There was no significant correlati
... Show MoreThe research discusses two variables are important, orientation marketing and quality of service, and that the purpose of the research is to see whether the telecom companies applied orientation marketing or not and to what extent is keen to apply it to suit the Iraqi environment as it has been applied research in kork Telecom company and Asia Cell Telecom are sectors service job in the business sector in Iraq, The information was obtained through the design of the questionnaire compatible runway Likert, and distribution (92) questionnaire, which (50) for the company Korek Telecom and (42) of the Asia-Cell, research population sample included a number of staff in the departments and units in the two companies, it has been support
... Show MoreTwelve species from Brassicaceae family were studied using two different molecular techniques: RAPD and ISSR; both of these techniques were used to detect some molecular markers associated with the genotype identification. RAPD results, from using five random primers, revealed 241 amplified fragments, 62 of them were polymorphic (26%).
ISSR results showed that out of seven primers, three (ISSR3, UBC807, UBC811) could not amplify the genomic DNA; other primers revealed 183 amplified fragments, 36 of them were polymorphic (20%). The similarity evidence and dendrogram for the genetic distances of the incorporation between the two techniques showed that the highest similarity was 0.897 between the va
... Show MorePrecision is one of the main elements that control the quality of a geodetic network, which defines as the measure of the network efficiency in propagation of random errors. This research aims to solve ZOD and FOD problems for a geodetic network using Rosenbrock Method to optimize the geodetic networks by using MATLAB programming language, to find the optimal design of geodetic network with high precision. ZOD problem was applied to a case study network consists of 19 points and 58 designed distances with a priori deviation equal to 5mm, to determine the best points in the network to consider as control points. The results showed that P55 and P73 having the minimum ellipse of error and considered as control points. FOD problem was applie
... Show MoreIn this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the BE
... Show MoreThis paper includes an experimental study of hydrogen mass flow rate and inlet hydrogen pressure effect on the fuel cell performance. Depending on the experimental results, a model of fuel cell based on artificial neural networks is proposed. A back propagation learning rule with the log-sigmoid activation function is adopted to construct neural networks model. Experimental data resulting from 36 fuel cell tests are used as a learning data. The hydrogen mass flow rate, applied load and inlet hydrogen pressure are inputs to fuel cell model, while the current and voltage are outputs. Proposed model could successfully predict the fuel cell performance in good agreement with actual data. This work is extended to developed fuel cell feedback
... Show MoreChemical compounds, characteristics, and molecular structures are inevitably connected. Topological indices are numerical values connected with chemical molecular graphs that contribute to understanding a chemical compounds physical qualities, chemical reactivity, and biological activity. In this study, we have obtained some topological properties of the first dominating David derived (DDD) networks and computed several K-Banhatti polynomials of the first type of DDD.
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More