Background: The immunogenetic predisposition
may be considered as an important factor for the
development of Type 1 Diabetes Mellitus (T1DM)
in association with the HLA antigens.
Objective:This study was designed to investigate
the role of HLA-class II antigens in the etiology of
type T1DM and in prediction of this disease in
siblings, and its effect on expression of glutamic
acid decarboxylase autoantibodies (GADA).
methods:Sixty children who were newly diagnosed
type 1 diabetes (diagnosed less than five months)
were selected. Their age ranged from 3-17 years.
Another 50 healthy siblings were available for this
study, their ages range from 3-16 years. Eighty
apparently healthy control subjects, matched with
age (4-17) years, sex and ethnic backgrounds
(Iraqi Arabs) underwent the HLA-typing
examination. Finally 50 healthy individuals were
selected randomly to undergo GADA test.
Results:At HLA-class II region, DR3 and DR4
were significantly increased in patients (53.33
vs.26.25% and 50.0 vs. 12.5% respectively) as
compared to controls. In
addition to that, T1DM was significantly associated
with DQ2 (33.33 vs.15%) and DQ3 (40.0 vs.20%)
antigens as compared to controls, suggesting that
these antigens had a role in disease susceptibility,
while the frequency of DR2 and DQ1 antigens were
significantly lowered in patients compared to
controls (6.66 vs.25% and 6.66 vs.22.5%
respectively). These molecules might have
protective effect. In siblings a significant increase
frequency of DR4 antigen (34.0 vs.12.5%) was
observed in comparison to controls, suggesting that
it might be much useful for predicting T1DM in
affected families.Anti-GAD autoantibodies were
present in 50% of Type 1Diabetic children, and in
16% of their siblings. High proportion of GADA
was found in the patients carrying HLA-DR3/DR4
heterozygous.
conclusion:Both the T1DM patients and their
siblings shared the HLA- DQ1 as protective
antigens, while DR3 and DR4 were susceptible one,
and high proportion of GADA was found in the
T1DM patients and siblings carrying HLADR3/DR4 heterozygous
Image compression is a serious issue in computer storage and transmission, that simply makes efficient use of redundancy embedded within an image itself; in addition, it may exploit human vision or perception limitations to reduce the imperceivable information Polynomial coding is a modern image compression technique based on modelling concept to remove the spatial redundancy embedded within the image effectively that composed of two parts, the mathematical model and the residual. In this paper, two stages proposed technqies adopted, that starts by utilizing the lossy predictor model along with multiresolution base and thresholding techniques corresponding to first stage. Latter by incorporating the near lossless com
... Show MoreChromene is considered a fused pyran ring with a benzene ring, which is found in many plants and is part of many important compounds such as anthocyanidins, anthocyanins, catechins, and flavanones. These compounds are included under the headings "flavonoids" and "isoflavonoids." These compounds are well known as bioactive molecules with wide medicinal uses. According to these pharmacokinetic characteristics, many researchers are giving more attention to this type of compound and its derivatives. Many chromene derivatives have been synthesized to study their biological effects for the treatment of many diseases. Furthermore, the researcher displayed wide interest in finding new methods for synthesizing chromene derivatives. These met
... Show MoreThe main objective of this study is to characterize the main factors which may affect the behavior of segmental prestressed concrete beams comprised of multi segments. The 3-D finite element program ABAQUS was utilized. The experimental work was conducted on twelve simply supported segmental prestressed concrete beams divided into three groups depending on the precast segments number. They all had an identical total length of 3150mm, but each had different segment numbers (9, 7, and 5 segments), in other words, different segment lengths. To simulate the genuine fire disasters, nine beams were exposed to high-temperature flame for one hour, the selected temperatures were 300°C (572°F), 500°C (932°F) and 700°C (1292°F) as recomm
... Show MoreThe Gas Assisted Gravity Drainage (GAGD) process has become one of the most important processes to enhance oil recovery in both secondary and tertiary recovery stages and through immiscible and miscible modes. Its advantages came from the ability to provide gravity-stable oil displacement for improving oil recovery, when compared with conventional gas injection methods such as Continuous Gas Injection (CGI) and Water – Alternative Gas (WAG). Vertical injectors for CO2 gas were placed at the top of the reservoir to form a gas cap which drives the oil towards the horizontal oil producing wells which are located above the oil-water-contact. The GAGD process was developed and tested in vertical wells to increase oil r
... Show MoreFinite Element Approach is employed in this research work to solve the governing differential equations related to seepage via its foundation's dam structure. The primary focus for this reason is the discretization of domain into finite elements through the placement of imaginary nodal points and the discretization of governing equations into an equation system; An equation for each nodal point or part, and unknown variables are solved. The SEEP / W software (program) is a sub-program of the Geo-Studio software, which is used by porous soil media to compensate for the problems of seepage. To achieve the research goals, a study was carried out on Hemrin dam, which located in the Diyala River 100 km northeast of Baghdad, Iraq. Thus, o
... Show MoreDielectric barrier discharges (DBD) can be described as the presence of contact with the discharge of one or more insulating layers located between two cylindrical or flat electrodes connected to an AC/pulse dc power supply. In this work, the properties of the plasma generated by dielectric barrier discharge (DBD) system without and with a glass insulator were studied. The plasma was generated at a constant voltage of 4 kV and fixed distance between the electrodes of 5 mm, and with a variable flow rate of argon gas (0.5, 1, 1.5, 2 and 2.5) L/min. The emission spectra of the DBD plasmas at different flow rates of argon gas have been recorded. Boltzmann plot method was used to calculate the plasma electron temperature (Te), and Stark broadeni
... Show MoreThis paper deals with, Bayesian estimation of the parameters of Gamma distribution under Generalized Weighted loss function, based on Gamma and Exponential priors for the shape and scale parameters, respectively. Moment, Maximum likelihood estimators and Lindley’s approximation have been used effectively in Bayesian estimation. Based on Monte Carlo simulation method, those estimators are compared in terms of the mean squared errors (MSE’s).
The main objective of this paper is to study the behavior of Non-Prismatic Reinforced Concrete (NPRC) beams with and without rectangular openings either when exposed to fire or not. The experimental program involves casting and testing 9 NPRC beams divided into 3 main groups. These groups were categorized according to heating temperature (ambient temperature, 400°C, and 700°C), with each group containing 3 NPRC beams (solid beams and beams with 6 and 8 trapezoidal openings). For beams with similar geometry, increasing the burning temperature results in their deterioration as reflected in their increasing mid-span deflection throughout the fire exposure period and their residual deflection after cooling. Meanwhile, the existing ope
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More