Serum samples were obtained from patients suffering from chronic Rheumatoid Arthritis (RA) disease. They were divided into three groups; 20 patients with RA taking biological treatment Etanercept (Enbrel), 20 patients with RA not taking biological treatment (disease modifying anti-rheumatic drug) and 10 people as healthy control group. The ages of these patients and control group were between 46-50 years old; one male and 19 female in each group. The samples were used for measuring the levels of Interleukin (IL)-1 Beta and Interleukin-10 using the Enzyme Linked Immunosorbent Assay technique. Both interleukins were at their highest levels in the group of RA patients treated with biological treatment followed by the RA patients group that were not treated with biological treatment and the lowest levels were in the healthy control group.
The aim of this research was to study the concentrations of Uranium in the phosphorus fertilizers using Nuclear track detector (CR-39). Our present investigation is based on the study of 10 types samples for different kinds of phosphorus fertilizers which were available in the local market Some of them were Iraqi made and the others from different countries like, (Iran, Italy, Holland, Lebanon and Jordan) .. The result obtained shows that the Uranium concentration in phosphorus fertilizers samples varies from (3.59ppm) to(2.59ppm). Based on the radioactive concentration of Uranium in the samples all the results obtained between(3.59ppm) in the Iraqi super phosphate to (2.59ppm) in the mixture Iraqi phosphate fertilizer are withi
... Show MoreThis research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MoreIn this research, aflatoxins were produced, extracted, isolated, and purified in order to optimize the storage conditions of feed. Using a preparative thin layer chromatography (TLC) method, with commercially available plates of 1.5 to 2.0 mm, B1 aflatoxin was isolated from the feed samples of whole wheat, maize, and crushed rice, and the procedure was repeated four times. A purity value of 99 % for B1 aflatoxin was achieved and tested using spectrophotometric and chromatographic methods. As solvents, acetone:water (85:15l) was used for aflatoxin extraction from the feed sample, whereas methanol: water (50: 50) was used for trichothecenes extraction. The primary findings of this research indicate that B1 aflatoxin reac
... Show MoreThe report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreAn expression for the transition charge density is investigated where the deformation in nuclear collective modes is taken into consideration besides the shell model transition density. The inelastic longitudinal form factors C2 calculated using this transition charge density with excitation of the levels for Cr54,52,50 nuclei. In this work, the core polarization transition density is evaluated by adopting the shape of Tassie model together with the derived form of the ground state two-body charge density distributions (2BCDD's). It is noticed that the core polarization effects which represent the collective modes are essential in obtaining a remarkable agreement between the calculated inelastic longitudinal F(q)'s and those of experimen
... Show MoreThis study is planned with the aim of constructing models that can be used to forecast trip production in the Al-Karada region in Baghdad city incorporating the socioeconomic features, through the use of various statistical approaches to the modeling of trip generation, such as artificial neural network (ANN) and multiple linear regression (MLR). The research region was split into 11 zones to accomplish the study aim. Forms were issued based on the needed sample size of 1,170. Only 1,050 forms with responses were received, giving a response rate of 89.74% for the research region. The collected data were processed using the ANN technique in MATLAB v20. The same database was utilized to
The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show More