The objective review is to inspect the involvement of Interleukin-6 (IL-6) in rheumatoid arthritis (RA) and to highlight the role of IL-6 and its variants in the pathogenesis of RA and response to anti-IL-6 agents. Several genetic and environmental risk factors and infectious agents contributed to the development of RA. Interleukin-6 is engaged in self-targeted immunity by modifying the equilibrium between T regulatory (T-reg) and T helper-17 (Th-17) cells. The evidences reported that IL-6 parti
Immunosuppressive cytokines are the main components of the tumor microenvironment and perform a vital function in controlling the immune response to malignant neoplasms.The objective: to study the influence of interleukin-4 (IL-4) and transforming growth factor-β3 (TGF-β3) on the development of breast tumors in women.Materials and methods. The concentration of cytokines IL-4 and TGF-β3 in blood serum was determined in 40 women with benign breast tumors, 40 women with malignant breast tumors, and 40 healthy patients without breast pathology, who were included in the control group.Breast cancer (BC) patients were divided into two groups; the first group included patients with the II stage of BC, who were considered to have a low le
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the most honorable of creation, Muhammad, whom God sent as a mercy to the worlds, and his pure God and his faithful companions. The Islamic heritage was replete with texts issued from among the pure infallibility, which constituted a prominent teacher that takes the student to stop there in search of its goals, purposes and beauty. The choice was made from those texts that were issued by the imams of Muslims in the Abbasid era, namely Imam Muhammad al-Jawad, his son Imam Ali al-Hadi and his grandson Imam Hassan Zaki al-Askari. (Peace be upon them), and scholars have called them (sons of satisfaction), and researchers have shed light on these texts from rhetorical, artistic
... Show MoreWastewater recycling for non-potable uses has gained significant attention to mitigate the high pressure on freshwater resources. This requires using a sustainable technique to treat natural municipal wastewater as an alternative to conventional methods, especially in arid and semi-arid rural areas. One of the promising techniques applied to satisfy the objective of wastewater reuse is the constructed wetlands (CWs) which have been used extensively in most countries worldwide through the last decades. The present study introduces a significant review of the definition, classification, and components of CWs, identifying the mechanisms controlling the removal process within such units. Vertical, horizontal, and hybrid CWs
... Show MoreLiquid-Liquid Extraction of Cu(II) ion in aqueous solution by dicyclohexyl-18-crown-6 as extractant in dichloroethane was studied .The extraction efficiency was investigated by a spectrophometric method. The reagent form a coloured complex which has been a quantitatively extracted at pH 6.3. The method obeys Beer`s law over range from (2.5-22.5) ppm with the correlation coefficient of 0.9989. The molar absorptivity the stoichiometry of extracted complex is found to be 1:2. the proposed method is very sensitive and selective.
Correlation and path coefficient analysis were worked out for ten morphological traits in 30 three-way crosses of maize. Phenotypic and genotypic correlation analysis indicated that ear length; row numbers per ear, grain numbers per row, leaf area and leaves numbers had a positive significant correlation with grain yield per plant. Further partitioning of correlation coefficients into direct and indirect effects showed that traits days to silking, row numbers per row and leaves numbers had a positive direct effect on grain yield per plant. The traits ear length, grain numbers per row and leaf area had a maximum total effect on grain yield. Furthermore, PCA analysis has gave interested
The formula of Ijarah and Ijarah ending with ownership is one of the investment formulas in Islamic banks, so this research has shed light on it in order to benefit from the experiences of the research sample banks, This research aims to find a reliable way for Iraqi Islamic banks, namely (leasing and leasing ending with ownership) in order to invest their money without usurious interests, The problem of the research emerges through the lack of awareness of the Iraqi Islamic banks to work with different Islamic financing formulas and their inability to invest their money through the adoption of their administrations for different formulas, including the leasing, and this is reflected in the decrease and fluctuation of its profits, Theref
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreThe using of recycled aggregates from construction and demolition waste (CDW) can preserve natural aggregate resources, reduce the demand for landfill, and contribute to a sustainable built environment. Concrete demolition waste has been proven to be an excellent source of aggregates for new concrete production. At a technical, economic, and environmental level, roller compacted concrete (RCC) applications benefit various civil construction projects. Roller Compacted Concrete (RCC) is a homogenous mixture that is best described as a zero-slump concrete placed with compacting equipment, uses in storage areas, dams, and most often as a basis for rigid pavements. The mix must be sufficiently dry to support
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More