Interleukin-1 β (IL-1 β) is considered to be one of the most important mediators in the pathogenesis of inflammatory diseases, particularly in neurodegenerative diseases such as multiple sclerosis (MS). MS is a chronic inflammatory disease characterized with demyelination in central nervous system (CNS). There was believe that single nucleotide polymorphisms (SNPs) in IL-1β gene can alter the structure and function of the IL-1β and consequently may have play role in MS disease. In this this study the IL-1β gene polymorphism (rs16944, rs1143634) and their association with MS in Iraqi patients were investigated. Two SNPs including IL-1β-511 (rs16944) in promoter and IL-1B+3962 (rs1143634) in encoding region, were studied using Polymerase Chain Reaction- Sequence Specific Primer (PCR-SSP) technique. The results revealed that IL-1β-511 SNP has three genotypes (CC,CT, TT) with non- significant difference in the SNP genotype and allele frequencies of MS patients compare with control group, it was also noticed that the risk allele was (C) with relative risk (RR=1.55) and higher frequency (60.77%) than T (39.23%) allele in RRMS patients. On other hand the three genotypes (CC,CT, TT) of IL-1B+3962 SNP it seem to have the same picture, that mean there was no significant difference in their frequencies between RRMS patients and control group , and the highest genotype frequency was for (CC) genotype (68.92%) and the lowest frequency was for( TT) genotype (2.88%) in patients, it was also noticed that the risk allele was (C) with odd ratio (2.44) and that the (T) frequencies were (16.98%vs. 33.33%) while (C) frequencies were (83.02 vs. 66.67%) in patients and control group respectively. Concerning with these findings, one can suggest that interleukin-1β gene polymorphisms may not be relevant to susceptibility to MS in Iraqi patients, this is probably due to many reasons such as ethnic diversity, the relevant of haplotype for this gene with other haplotype of cytokine encoding genes and finally the limitation of sample size which play critical role in SNPs studies.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant
... Show MoreAbstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show MoreCharge transfer in styryl dyes STQ-1, STQ-2,and STQ-3 with organic media system has been studied theoretically depending on the Franck- Condon rule and continuum dielectric model . The reorientation energies (eV) were evaluated theoretically depending on dipole momentum, dielectric constant , and refrective index n. The rate constant of charge transfer has been calculated depending on the reorientation energy (eV) ,effective free energy , potential height barrier , and coupling coefficient . A matlap program has been written to calculated the rate constant of charge transfer and other parameter. The results of calculations show that STQ-2 dye is more reaction for charge transfer compare with STQ-1 and STQ-3 dyes