Objective : Multiple sclerosis (MS) is a common neurological disease deeply linked with the immune-inflammatory disorders whereas the term (multiple) mostly refers to the multi-focal zones of Inflammation caused by lymphocytes and macrophages infiltration besides oligodendrocytes death. Accordingly , the dysfunctional immune system able to damage myelin ( a pivotal component of the central nervous system ) which responsible for communication among neurons. The aim of the present study is to innovate a biochemical relationship between MS and thyroid hormones (THs) by highlighting immunological responses and also to examine the action of Interferon beta (IFNβ) drug on thyroid hormone (THs) and thyroid stimulation hormone (TSH). Materials and methods: Sixty (60) Iraqi women in the age ranged (36-43) years were enrolled in the present study, (30) of them were MS patients and the other (30) were healthy. Anyway, the protocol of the study involved four groups: G1 is a healthy control group, G2 involved untreated MS patients, G3 included the MS patients treated with IFNβ for (6) weeks and G4 composed of the same patients treated with IFNβ for (12) weeks. THs (T4 and T3) and TSH levels were determined in sera of all groups. Results: Data of the present study have reported that T4 level was highly significant increase in sera of G2 compared with G1 while it was significant and highly significant decreased in G3 and G4 respectively compared with G2, the difference between G4 and G1 and also between G4 and G3 was significant. T3 level was highly significant increase in sera of G2 compared with G1 but it was highly significant decreased in G3 and G4 compared with G2, the difference between G4 and G1 was non-significant while the difference between G4 and G3 was significant. Conversely, TSH level was highly significant decreased in G2 compared with G1 but it was highly significant increase in G3 and G4 compared with G2, the difference between G4 and G1 and also between G4 and G3 was highly significant. Conclusions : Interestingly , the present study is the first in Iraq reporting that MS may be a key risk factor for hyperthyroidism and also the first suggesting that IFNβ regulates THs biosynthesis via novel immuno-neuro-enzymological mechanisms regarding thyroid peroxidase (TPO) and iodothyronine deiodinase 1 (D1), meanwhile the present study indicates that IFNβ has an indirect antioxidant activity. Moreover, the present study provides a definite clarification for the changed NF kappa B level in MS. Remarkably, the present study reveals that IFNβ is more potent on T3 than T4 while it has less action on TSH.
In this paper we tend to describe the notions of intuitionistic fuzzy asly ideal of ring indicated by (I. F.ASLY) ideal and, we will explore some properties and connections about this concept.
This paper deal with the estimation of the shape parameter (a) of Generalized Exponential (GE) distribution when the scale parameter (l) is known via preliminary test single stage shrinkage estimator (SSSE) when a prior knowledge (a0) a vailable about the shape parameter as initial value due past experiences as well as suitable region (R) for testing this prior knowledge.
The Expression for the Bias, Mean squared error [MSE] and Relative Efficiency [R.Eff(×)] for the proposed estimator are derived. Numerical results about beha
... Show MoreThe adhesion strength between Polyethylene (PE) film and Aluminum surface by using the adhesive material (Cyanoacrylate) has been studied. Aluminum (Al) was used as a substrate, and polyethylene (PE) was used as a film adhered to the Al surface. Standard specimens were prepared to use in the peeling test in dry condition, other specimens were immersed in water for 12 days at room temperature. the results for the specimens in the dry condition had shown that high value in the peel force and the peel energy, the peel force was 0.38*103 N/m and the peel energy was 0.605*103 N/m, peeling the film from Al surface leaves a residual of the adhesive material on both adherend, the failure for this specimen were combination of adhesive and cohesive f
... Show MoreLet M be a n-dimensional manifold. A C1- map f : M M is called transversal if for all m N the graph of fm intersect transversally the diagonal of MM at each point (x,x) such that x is fixed point of fm. We study the minimal set of periods of f(M per (f)), where M has the same homology of the complex projective space and the real projective space. For maps of degree one we study the more general case of (M per (f)) for the class of continuous self-maps, where M has the same homology of the n-dimensional sphere.
As regional development, as a matter of course, poses a number of systemic, scientific and political problems. While the issue of development is primarily at the national level to the limits of World War II in the industrialized world and to the 1960s borders in most Third World countries, the increasing awareness of regional disparities has led to the regional issue Were taken into consideration in the early 1960s and 1970s in most industrialized and developing countries alike. The local issue was only introduced in the early 1980s. The awareness of regional disparities and the fact that the regions do not have the same potential and that some regions have the resources to enable them to develop, grow and develop, unlike other r
... Show MoreIn this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More