Interleukin-33 [IL-33] is a specific ligand for the ST2 receptor, and a member of the
IL-1 family. It is a dual-function protein that acts both as an extracellular alarmin cytokine,
and an as an intracellular nuclear factor participates in maintaining barrier function by
regulating gene expression of IL-33 modulating tumor growth and anti-tumor immunity in
cancer patients. The present study aimed to investigate the role of IL-33 serum level and gene
polymorphism in Iraqi women with breast cancer. Materials and methods: Blood samples
were collected from 66 Iraqi patient women diagnosed with breast cancer, which were divided
into two groups: pre-treatment [PT] and under treatment with chemotherapy [UTC] patients in
addition to 34 apparently healthy women who were matched with patients as a control.
ELISA technique was used to determine the IL-33 serum level. The PCR-RFLP technique
was performed to determine IL-33 gene polymorphisms at single nucleotide polymorphism
SNP [rs1929992]. Results: IL-33 serum level recorded lower significant in PT [182.22 ±
29.86pg/ml] and UTC [129.87 ± 45.11pg/ml] patients compared with control [258.08 ± 39.54 pg/ml] under [p<0.05]. In a polymorphism study on IL-33 SNP [rs1929992] showed AG genotype recorded the high frequency in control than in patients [76.47, 58.46] compared to other genotypes AA, GG with no significant difference according to fisher’s exact probability. In conclusion: IL-33 serum level decreased after performing surgery on breast cancer patients. There was no association between breast cancer development and IL-33 SNP [rs1929992]. The heterozygous genotype AG was a common genotype in the Iraqi population. Allele G had an environmental fraction, while allele A had preventive fraction, which related to increasing the level of IL-33 with both genotypes AA, AG in the healthy control group, in contrast with GG genotype which showed the highest level in the patients’ group.
Roald Dhal's is a prominent British short story writer who presented a fictional world full of contradictions and ironies. It is also full of double meanings where things are not what they appear to be and where meaninglessness is a prominent component. Dahl's world is also colored with blackness and grotesqueness; full of comedy that makes you shiver instead of laugh and characters who invite a sneak peek into a different side, a dark side of human nature. Dahl's themes are various and gripping but usually revolve around the triangle that frames his fiction: violence, humour, and absurdity. What seems to be a prominent and recurrent theme that intersects with every element in this triangle is revenge. In one story after another Dahl pre
... Show MoreA vector in a separable infinite dimensional Hilbert space is called disk-cyclic for bounded operator if the orbit α : 0, α∈;|∝| 1is dense in. The useful tool used to discover codisk-cyclic operation is called the disk-cyclic Criterion. In this paper we will show that some equivalent conditions of the
Atotal of 551 water samples drinking( five Water Treatment Plans (WTPs) and raw water( from different sites on Tigris river) were collected.According to morphological characteristics and a set of biochemical tests, one hundred twenty eight of Aeromonas spp isolates were obtained In this study The percentages of Aeromonas recovery from river water was 72.52%, from wells water was (35%).Total percentage of positive aeromonas samples of treated water(Filtration &chlorine tank, supply water of WTPs, distribution system, reserviores and other samples not related to WPTs) was 8.8%.Count of Aeromonas in positive aeromonas samples ranging from 1 to 175 cfu 100 ml.
The results showed that generally no significant correlation between presen
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More
Research Summary
The doctrine of belief in the Last Day is one of the pillars of faith, and the doctrine of resurrection and reckoning are part of this day.
Belief in the Last Day puts a person in constant control over himself, as this control creates in this person happiness and a decent life, and he renounces the world and turns away from all vices and adorns all virtues.
On the other hand, we find that the person who does not believe in this day does not stand before his eyes anything that prevents him from doing injustices and corruption in the land. The doctrine of belief in the Last Day alone is
... Show MoreB3LYP density functional is utilized for probing the effect of decorating Al, Ga, and In on the sensing performance of a boron phosphide nanotube (BPNT) in detecting the 2-chloroethanol (CHE) molecule. We predict that the interaction of pure BPNT with CHE is physisorption, and the sensing response (SR) of BPNT is approximately 6.3. The adsorption energy of CHE is about − 26.3 to − 91.1, − 96.6, and − 100.3 kJ/mol, when the Al, Ga, and In metals are decorated on the BPNT surface, respectively. This indicates that the decorated metals significantly strength the interaction. Also, the corresponding SR meaningfully rises to 19.4, 41.0, and 93.4, indicating that by increasing the atomic number of metals, the sensitivity i
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show MoreArabic calligraphy has a special status as one of the most important oriental arts, which has been enhanced by the Islamic value. The Arabic fonts have been diverse in their classification into soft lines such as Diwani, thuluth and patch lines and others, and geometrical lines such as Kufic lines and their various types. The contemporary artist was also able to adapt the Arabic calligraphy of all kinds in the construction of the painting or line formations, especially after the development of the artistic digital techniques and computer software. Here comes the role of the industrial designer as being more in touch with the practical, technical and productive life, which requires great care in adapting the line formations of the Arabic
... Show More