Objective : Multiple sclerosis (MS) is a common neurological disease deeply linked with the immune-inflammatory disorders whereas the term (multiple) mostly refers to the multi-focal zones of Inflammation caused by lymphocytes and macrophages infiltration besides oligodendrocytes death. Accordingly , the dysfunctional immune system able to damage myelin ( a pivotal component of the central nervous system ) which responsible for communication among neurons. The aim of the present study is to innovate a biochemical relationship between MS and thyroid hormones (THs) by highlighting immunological responses and also to examine the action of Interferon beta (IFNβ) drug on thyroid hormone (THs) and thyroid stimulation hormone (TSH). Materials and methods: Sixty (60) Iraqi women in the age ranged (36-43) years were enrolled in the present study, (30) of them were MS patients and the other (30) were healthy. Anyway, the protocol of the study involved four groups: G1 is a healthy control group, G2 involved untreated MS patients, G3 included the MS patients treated with IFNβ for (6) weeks and G4 composed of the same patients treated with IFNβ for (12) weeks. THs (T4 and T3) and TSH levels were determined in sera of all groups. Results: Data of the present study have reported that T4 level was highly significant increase in sera of G2 compared with G1 while it was significant and highly significant decreased in G3 and G4 respectively compared with G2, the difference between G4 and G1 and also between G4 and G3 was significant. T3 level was highly significant increase in sera of G2 compared with G1 but it was highly significant decreased in G3 and G4 compared with G2, the difference between G4 and G1 was non-significant while the difference between G4 and G3 was significant. Conversely, TSH level was highly significant decreased in G2 compared with G1 but it was highly significant increase in G3 and G4 compared with G2, the difference between G4 and G1 and also between G4 and G3 was highly significant. Conclusions : Interestingly , the present study is the first in Iraq reporting that MS may be a key risk factor for hyperthyroidism and also the first suggesting that IFNβ regulates THs biosynthesis via novel immuno-neuro-enzymological mechanisms regarding thyroid peroxidase (TPO) and iodothyronine deiodinase 1 (D1), meanwhile the present study indicates that IFNβ has an indirect antioxidant activity. Moreover, the present study provides a definite clarification for the changed NF kappa B level in MS. Remarkably, the present study reveals that IFNβ is more potent on T3 than T4 while it has less action on TSH.
Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of how the
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreThis study, which was conducted in the city of Mosul, through collected 1200 samples from the stool of patients with diarrhea attending hospitals and private clinics for the period from the beginning of January 2019 to the end of December 2019, those whose ages ranged from less than a year-60 year, and for both sexes and by reality 700 samples stool for males and 500 samples stool for females. Samples were collected in clean, sterile, and sealed 40ml plastic bottles. Patient information is noted, name of the parasite, history, sex, age, address. The result showed that climate and temperature have a significant effect on increase the incidence of intestinal parasites through the direct effect on the increase in infection rate. This effect wa
... Show MoreDBN Rashid, International Journal of Development in Social Sciences and Humanities, 2020
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThe global health crisis resulting from the spread of the Corona virus, which the World Health Organization described on January 30, 2020 as a public health emergency of international concern, then returned to describe it as a pandemic on March 11, 2020, and the measures and procedures taken by government authorities in different countries of the world, whether at the highest level of imposing a comprehensive curfew or what is called globally home quarantine and thus disrupting all sectors and activities in the state, whether public or private (with the exception of some sectors such as the health, media and security sectors), or at a lower level than that, such as reducing work rates in different sectors by rates that vary from one country
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More