Objective : Multiple sclerosis (MS) is a common neurological disease deeply linked with the immune-inflammatory disorders whereas the term (multiple) mostly refers to the multi-focal zones of Inflammation caused by lymphocytes and macrophages infiltration besides oligodendrocytes death. Accordingly , the dysfunctional immune system able to damage myelin ( a pivotal component of the central nervous system ) which responsible for communication among neurons. The aim of the present study is to innovate a biochemical relationship between MS and thyroid hormones (THs) by highlighting immunological responses and also to examine the action of Interferon beta (IFNβ) drug on thyroid hormone (THs) and thyroid stimulation hormone (TSH). Materials and methods: Sixty (60) Iraqi women in the age ranged (36-43) years were enrolled in the present study, (30) of them were MS patients and the other (30) were healthy. Anyway, the protocol of the study involved four groups: G1 is a healthy control group, G2 involved untreated MS patients, G3 included the MS patients treated with IFNβ for (6) weeks and G4 composed of the same patients treated with IFNβ for (12) weeks. THs (T4 and T3) and TSH levels were determined in sera of all groups. Results: Data of the present study have reported that T4 level was highly significant increase in sera of G2 compared with G1 while it was significant and highly significant decreased in G3 and G4 respectively compared with G2, the difference between G4 and G1 and also between G4 and G3 was significant. T3 level was highly significant increase in sera of G2 compared with G1 but it was highly significant decreased in G3 and G4 compared with G2, the difference between G4 and G1 was non-significant while the difference between G4 and G3 was significant. Conversely, TSH level was highly significant decreased in G2 compared with G1 but it was highly significant increase in G3 and G4 compared with G2, the difference between G4 and G1 and also between G4 and G3 was highly significant. Conclusions : Interestingly , the present study is the first in Iraq reporting that MS may be a key risk factor for hyperthyroidism and also the first suggesting that IFNβ regulates THs biosynthesis via novel immuno-neuro-enzymological mechanisms regarding thyroid peroxidase (TPO) and iodothyronine deiodinase 1 (D1), meanwhile the present study indicates that IFNβ has an indirect antioxidant activity. Moreover, the present study provides a definite clarification for the changed NF kappa B level in MS. Remarkably, the present study reveals that IFNβ is more potent on T3 than T4 while it has less action on TSH.
A new Macrocyclic Schiff base ligand Bis[4-hydroxy(1,2-ethylene-dioxidebenzylidene) pheylenediamine] [H2L] and its complexes with (Co(II) , Ni(II) , Cu(II) , Zn(II) and Cd(II)) are reported . The ligand was prepared in two steps,in the first step a solution of (o-phenylene diamine) in methanol react under reflux with (2,4-dihydroxybenzylaldeyed) to give an (intermediatecompound) [Bis-1,2 (2,4-dihydroxybenzylediene)pheylinediamine] which react in the second step with (1,2- dichloro ethane) giving the mentioned ligand.Then the complexes were synthesis of adding of corresponding metal salts to the solution of the ligand in methanol under reflux with 1:1 metal to ligand ratio. On the basis of, molar conductance, I.R., UV-Vis, chloride content a
... Show Moreفي هذا البحث تم تحضير المركبات المعدنية النانوية الجديدة لأيونات البلاتين 4+و الذهب 3+ مع ليكاند قاعدة مانخ جديد مشتق من السيبروفلوكساسين بطريقة الموجات فوق الصوتية. تم تشخيص المعقدات النانوية والليكاند الجديد بأستخدام تقنيات فيزيائية و كيميائية مختلفة مثل أطياف الاشعة تحت الحمراء، حيود الاشعة السينية ، المجهر الالكتروني الماسح ، المجهر الالكتروني النافذ و مجهر القوة الذرية. تم تحديد نشاط مضادات الأك
... Show MoreThe importance of the study lies in highlighting the role of smartwatches as a modern tool for analyzing training load based on functional indicators, such as heart rate and calorie consumption. This allows coaches to monitor individual players’ responses during different training periods, helping to improve physical performance efficiency and reduce the risk of overload-induced fatigue. The study aimed to analyze calorie consumption at different heart rate levels between the special preparation and competition periods for youth football players, with the goal of determining the effect of physiological adaptation on energy efficiency. To achieve this objective, the researcher adopted the descriptive method due to its suitability f
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More