Endometriosis, an autoimmune disease is among one of the most challenging of the 21 st century that affects women in reproductive age. The aim of the present study is to highlight the role of IL-36γ, and its relationship with other cytokines (Ang-2 and TNF-α) in the pathogenesis of endometriosis . Seventy five (75) consecutive women patient of reproductive age (25-40) years were enrolled in this study , Patients were divided into three groups , group 1 (G1) included (25) newly diagnosed endometriotic patients , that were not given any treatment related to Gynecology or anti-inflammatory medications . Second group : group 2 (G2) consists of (25) endometriotic patient who were treated with zoladex for 3 to 5 months , they received zoladex injection every 28 day in the first day after diagnosis. The third group: Group 3 (G3) involved (25) patients with recurrent endometriosis , they were post treatment of zoladex and diagnosis revealed recurrence of endometriosis. Patients groups were compared with two control groups , with matched age with patients’ groups. The first control group (C) included (25) healthy women , and the second control group or pathological control group (PC) involved (25) women suffering from infertility caused by gynecological disorder unrelated to endometriosis.IL-36γ , Ang-2 and TNF-α were estimated in sera of studied groups. The results from this study revealed that IL-36γ levels were highly significant increase (p<0.001) and significant increase (p<0.05) in G1 comparing with groups C and PC respectively. While high significant decrease(p<0.001) was found in G2 comparing with G1. Also , there are no significant differences (p≥0.05) shown in G2 comparing with C group and in G3 comparing with G1.On the otherhand , Ang-2 levels were highly significant increased (p<0.001) and significant increase (p<0.05) in G1 comparing with groups C and PC respectively. While significant decrease (p<0.05) was found in G2 comparing with G1. Also , there are no significant differences (p≥0.05) in Ang-2 levels shown in G2 comparing with C group and in G3 comparing with G1 Our results also implied that TNF-α levels were highly significant increased (p<0.001) in G1 comparing with C group. While no significant differences (p≥0.05) was found in G1 comparing with PC group and in G3 comparing with G1. Also there are significant differences (p<0.05) shown in G2 comparing with G1 and C group. Our findings for endometriotic patient groups. A high significant difference was found between Ang-2 and TNF-α levels with IL-36γ for G1 , G2 and G3. The conclusion of this study reveals that IL-36γ could be considered a novel biochemical marker in endometriotic patients. Conclusion could be drawn from the results that endometriosis may be influenced on the cytokines secretion such as IL-36γ beside Ang-2 and TNF-α in G1 and G3 , suggesting that inflammatory / immunological factors associating with angiogenesis responses play crucial roles in the pathogenesis of endometriosis. Also, the results showed the role of zoladex in alteration immune responses as shown in G2
In 1939, the Japanese scientist Michio Takaoka first mentioned resveratrol from Veratrum grandiflorum O. Loes. Majority of plants, such as grapes, berries, and peanuts, are significant sources of resveratrol, a well-known polyphenolic. resveratrol (RV) is noted for its links to several health care benefits, including glucose metabolism, anti-aging, cardioprotective, neuroprotective, antitumor, antidiabetic, and antioxidant effects. Importantly, there have been reports of promising therapeutic qualities in atherosclerosis, dementia, and various malignancies. These properties are controlled through a number of cooperative techniques, which control inflammation besides the effects of oxidative stress and cell death. However, circulating resver
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreRoof in the Iraqi houses normally flattening by a concrete panel. This concrete panel has poor thermal properties. The usage of materials with low thermal conductivity and high specific heat gives a good improvements to the thermal properties of the concrete panel, thus, the indoor room temperature improves. A Mathcad program based on a mathematical model employing complex Fourier series built for a single room building. The model input data are the ambient temperature, solar radiation, and sol-air temperature, which have been treated as a periodic function of time. While, the room construction is constant due to their materials made of it, except the roof properties are taken as a variable generated practically from the
... Show MoreA new distribution, the Epsilon Skew Gamma (ESΓ ) distribution, which was first introduced by Abdulah [1], is used on a near Gamma data. We first redefine the ESΓ distribution, its properties, and characteristics, and then we estimate its parameters using the maximum likelihood and moment estimators. We finally use these estimators to fit the data with the ESΓ distribution
This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
The eggshell cuticle is the proteinaceous outermost layer of the eggshell which regulates water exchange and protects against entry of micro-organisms. Outer eggshell and cuticle protein was extracted from domestic chicken. The aim of the research is to find out the effect of the treated and untreated nano particles of egg shells with micro wave cold plasma on the effectiveness of E. coli (negative bacteria) that infect the skin and measure the diameter of bacterial inhibition zone, the eggshell has been prepared by a chemical method (sol gel) and measure the level of acidity and the PH is neutral. The result of Atomic Force Microscope (AFM) shows that the particles diameters become smaller with nano-particles solution than for egg
... Show MoreThe main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the re
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos