Preferred Language
Articles
/
bijps-430
Serum Levels of Total IgE, IL-12, IL-13 and IL-18 in Children Patients with Asthma
...Show More Authors

T-cell activation and alteration of cytokine levels are involved in the pathogenesis of asthma. However, the profile of circulating T-lymphocyte subsets and related cytokines during asthmatic attacks is still unclear. We compared the serum concentrations of proinflammatory cytokines Interleukine-18( IL-18) and Interleukine-12(IL-12), T-helper 2 (Th2) cytokine Interleukine-13(IL-13 ) and Immunoglobuline-E ( IgE) in 27 asthmatic children and 21 sex and age matched healthy control subjects. Serum cytokines and IgE concentrations were measured by enzyme-linked immunosorbent assay. Serum IL-13 , IL-18 and IgE concentrations were significantly higher in asthmatic patients than normal control subjects ( IL-13: median 9.73 versus 4.43 pg/ml, P<0.05  ; IL-18: 76.81 versus 35.41 pg/ml, P<0.05 ; IgE: 225.44 versus 37.94 IU/ml, P<0.05 . Asthmatic patients showed a decreased       serum IL-12 concentration 93.57 versus 122.83 pg/ml, P<0.05 . In conclusion, it was suggested that IL-13 and IL-18 might have a potential role in controling lymphocyte responses in asthmatic patients specially in children through an IgE-mediated pathway.

Key words: Asthma, Interleukine-12, -13, -18, Immunoglobuline-E.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
Thermal Simulation for Unconditioned Single Zone with Modified Roof
...Show More Authors

Roof in the Iraqi houses normally flattening by a concrete panel. This concrete panel has poor thermal properties. The usage of materials with low thermal conductivity and high specific heat gives a good improvements to the thermal properties of the concrete panel, thus, the indoor room temperature improves. A Mathcad program based on a mathematical model employing complex Fourier series built for a single room building. The model input data are the ambient temperature, solar radiation, and sol-air temperature, which have been treated as a periodic function of time. While, the room construction is constant due to their materials made of it, except the roof properties are taken as a variable generated practically from the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Sat Jun 29 2013
Journal Name
Journal Of Statistics Applications & Probability
Analyzing Skewed Data with the Epsilon Skew Gamma distribution
...Show More Authors

A new distribution, the Epsilon Skew Gamma (ESΓ ) distribution, which was first introduced by Abdulah [1], is used on a near Gamma data. We first redefine the ESΓ distribution, its properties, and characteristics, and then we estimate its parameters using the maximum likelihood and moment estimators. We finally use these estimators to fit the data with the ESΓ distribution

Crossref (5)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Improve Data Mining Techniques with a High-Performance Cluster
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Egocentrism & its Relationship with Academic Adaptation among University students
...Show More Authors

The research aimed to identifying :

  1. Egocentrism of the university students .
  2. Academic adaptation of the university student.
  3. Differences in Egocentrism according to the both variable ( Gender and Specialization ) of the university student.
  4. Differences in academic adaptation according to the both variable ( Gender and Specialization ) of the university student .
  5. The Contribution of academic adaptation to Egocentrism of the university student .

The sample of the research consisted of ( 400 ) students.      
Tow instruments have been us

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Reservoir Network With Structural Plasticity for Human Activity Recognition
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Aggregate production planning using linear programming with practical application
...Show More Authors

Abstract :

The study aims at building a mathematical model for the aggregate production planning for Baghdad soft drinks company. The study is based on a set of aggregate planning strategies (Control of working hours, storage level control strategy) for the purpose of exploiting the resources and productive capacities available in an optimal manner and minimizing production costs by using (Matlab) program. The most important finding of the research is the importance of exploiting during the available time of production capacity. In the months when the demand is less than the production capacity available for investment. In the subsequent months when the demand exceeds the available energy and to minimize the use of overti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 08 2024
Journal Name
Engineering, Technology &amp; Applied Science Research
Making Different Topographic Maps with the Surfer Software Package
...Show More Authors

The main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the re

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Tracked Robot Control with Hand Gesture Based on MediaPipe
...Show More Authors

Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref