Background: Alopecia areata(AA) is a common autoimmune disease that causes hair loss without scarring. It occurs as a result of T-helper 1 (Th1) and Th17 cells attacking the anagen hair follicles. Genetic factors play a role in the occurrence of infection, which stimulates the production of pro and anti-inflammatory interleukins. Polymorphisms of IL-37 play a role in autoimmune diseases. However, IL37 single nucleotide polymorphisms(SNP) have not been identified in patients with AA. Therefore, this study aimed to reveal the IL37 gene SNP and its relationship to AA. Methods: Genotyping of IL-37 gene single nucleotide polymorphisms SNPs were detected using sequence-specific primer-polymerase chain reaction (SSP-PCR) method was done following the protocol of DNA Extraction kit and PCR PreMix SNP Genotyping Assays in 51 (32 males & 19 females at age mean 27.90±1.66 years) patients with AA and 50 (21 males & 29 females at age mean30.64±2.08years ) healthy individuals. Results: The results of the present study showed a significant increase in the mean level of IL-37 in the serum of patients with AA compared to healthy subjects (184.18±69.45 vs.153.28±48.17) pg/ml. This increase did not constitute a significant difference at a probability level less than. In addition, genotypes of single nucleotide polymorphisms (SNPs) of IL-37 gene were rs3811045 (5756 T>C) and rs3811046 (5831 G>T) that result in substitution and inversion mutations, and thus cause a change in the type of amino acid. The CC and allele C and TC of rs3811045 were risk factors for AA due to a significantly higher odd ration (OR) value and a significantly increased frequency percentage in patients group compared to a healthy control group (37.50 vs 25.58 OR: 1.75 p = 0.264, 95% CI = 0.72–4.25, 66.0 vs 86.0 OR: 1.78 p = 0.068, 95% CI = 0.98–3.23; 56.25 vs 55.81 OR: 1.02 p = 1.0 95% CI = 0.45–2.31 respectively). Also the results of rs3811046 recorded that the TT and allele T frequency percentages were significant increase in patients group (39.58 vs 25.58 OR: 1.91 P = 0.184, 95% CI = 0.79-4.63, 66.0 vs. 52.0 OR: 1.74, P =0.072,95%CI= 0.96–3.15) respectively, which was a risk factor for infection. This study is the first of its kind to show the relationship of IL-37 level and genetic single nucleotide polymorphisms with AA. Conclusions The present study's results can conclude that the TC, CC and the C allele of IL-37 SNP rs3811045 and TT genotypes and the T allele of IL-37 SNP rs3811046 have a role in the risk of developing AA. It is recommended to conduct several genetic studies of other interleukin genes and to ascertain their relationship to AA. © 2023, Journal of Biomechanical Science and Engineering.
The performance of single and two stage solar concentrator were studied ' " The ratio of the primary to the secondary mirrors diameter is taking to be 0.5, depending on the theoretical calculation for the accumulated energy by the concentrator with ratio between 0.0 to 0.9. The design of the systems were designed and examined by using a ray-tracing program. The efficiency of the single and the two stage concentrators are calculated and compared with and without cooling systems.
In this paper, a single-phase boost type ac-dc converter with power factor correction (PFC) technique is designed and implemented. A current mode control at a constant switching frequency is used as a control strategy for PFC converter. The PFC converter is a single-stage singleswitch boost converter that uses a current shaping technique to reshape the non-sinusoidal input current drawn by the bulky capacitor in the conventional rectifier. This technique should provide an input current with almost free-harmonics, comply with the IEC61000-3-2 limits, and a system operates with near unity power factor. The other function of the boost converter that should be
accomplished is to provide a regulated DC output voltage. The complete designed
Background: Injuries to blood vessels are among the most dramatic challenges facing trauma surgeons because repair is often urgent, the surgeon has to decide between management options (open or endovascular), and gaining control and reconstructing a major arterial injury can be technically demanding .
Objective:,To analyze the cause of injury, surgical approach, outcome and complications of axillary artery injuries.
Methods A descriptive cross-sectional study on fifty patients at Ibn-Alnafees hospital in Baghdad from January 2005 to December 2010
Results Males were more commonly affected than female with ratio of 6.1:1. Most injuries were caused by bullet and shell (84%), followed by stab wounds (10%) and blunt trauma (6%). Pati
Soil wetted pattern from a subsurface drip plays great importance in the design of subsurface drip irrigation (SDI) system for delivering the required water directly to the roots of the plant. An equation to estimate the dimensions of the wetted area in soil are taking into account water uptake by roots is simulated numerically using HYDRUS (2D/3D) software. In this paper, three soil textures namely loamy sand, sandy loam, and loam soil were used with three different types of crops tomato, pepper, and cucumber, respectively, and different values of drip discharge, drip depth, and initial soil moisture content were proposed. The soil wetting patterns were obtained at every thirty minutes for a total time of irrigation equ
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreMaximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreAbstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show More