Background: Tinea versicolor is a common dermatological problem ,world wide distribution , caused by a dimorphic fungus called Malassezia furfur ,it live normally on skin as a commensal . Many factors play a role in the etiology of TV among these could be the disturbed immune system which may be related to the ability of TV alter the immune system by a process called Immunomodulation leading to subsequent infection. Immuno-inflammatory activity mediated by different cytokines could have a role in the etiology of TV.
Objective: To evaluate the serum level of the inflammatory cytokines ,IL-4andIL-8,in patients with TV as compared to immunocompramized patients and healthy groups.
Patients and methods: This study enrolled 50 total patients, 15 of them were as patients control group who were immunocompramized with evident skin lesion ,to be compared serologically with 15 patients who had TV and normal immunity, the control group composed of20 healthy volunteers. Using ELISA test technique the following tests were done :detection of IL-4 and IL-8 in the sera of all groups.
Results and discussion: The statistical differences in the rate of detectable IL-4 level between TV and healthy control p< 0.001,while the difference was a highly significant between the healthy control and immunocompramized patients with TV,P<0.00338.The difference between two diseased groups was(p< 0.219)which is non significant , when p<0. 05 was considered significant. IL-8 the results of our study showed a significant difference between the healthy control and the patients with tinea versicolor, p-value was( 0.05). In this study there was a nice findings by which the difference between the healthy control and the immunocompramized patients was highly significant as ,p<0.005.
Conclusion :The genus Malassezia is an immunological paradox. In some circumstances, it acts as an adjuvant, activates the complement cascade, and elicits both cellular and humoral immune responses in healthy individuals, among which IL8 and IL-4 were notably increased . In contrast, it also seems to have the ability not only to evade the immune system but actually to suppress the response directed against
The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show More'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
Background: One of the major health concerns and possible risk factors in open heart surgery is the increasing prevalence of obesity among patients.
Methodology: Over a period of sixteen months (February 2017 to June 2018), 246 patients underwent coronary artery bypass graft surgery (CABG) in Slemani Cardiac Hospital (SCH). The patients were divided according to the WHO classification into two groups: The obese (BMI ≥ 30) and the non-obese (BMI < 30) and were compared in regard to the rate of occurrence of early postoperative complications.
Objective: To evaluate the impact of obesity [body mass i
... Show MoreIn this paper, two of the local search algorithms are used (genetic algorithm and particle swarm optimization), in scheduling number of products (n jobs) on a single machine to minimize a multi-objective function which is denoted as (total completion time, total tardiness, total earliness and the total late work). A branch and bound (BAB) method is used for comparing the results for (n) jobs starting from (5-18). The results show that the two algorithms have found the optimal and near optimal solutions in an appropriate times.
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreThis paper aims to find new analytical closed-forms to the solutions of the nonhomogeneous functional differential equations of the nth order with finite and constants delays and various initial delay conditions in terms of elementary functions using Laplace transform method. As well as, the definition of dynamical systems for ordinary differential equations is used to introduce the definition of dynamical systems for delay differential equations which contain multiple delays with a discussion of their dynamical properties: The exponential stability and strong stability
In this research, Artificial Neural Networks (ANNs) technique was applied in an attempt to predict the water levels and some of the water quality parameters at Tigris River in Wasit Government for five different sites. These predictions are useful in the planning, management, evaluation of the water resources in the area. Spatial data along a river system or area at different locations in a catchment area usually have missing measurements, hence an accurate prediction. model to fill these missing values is essential.
The selected sites for water quality data prediction were Sewera, Numania , Kut u/s, Kut d/s, Garaf observation sites. In these five sites models were built for prediction of the water level and water quality parameters.