Preferred Language
Articles
/
bijps-579
Evaluation of the Role of Interleukein-2 and Interleukein-4 in the Immunopathogenesis of Steroid Therapy Resistance in Iraqi Asthmatic Patients
...Show More Authors

Interleukins (IL-2 and IL-4) are increased in asthmatics and were reported to induce resistance to steroid therapy in some patients who fail to get benefit from glucocorticoids when used in full dose and for long period of time. In this context, the present study was conducted on Iraqi patients to provide additional laboratory mean, beside the clinical diagnosis, for the decision whether the asthma is steroid sensitive or resistant by monitoring the level of immunoglobulins, complement proteins and interleukins among asthmatic patients (steroid sensitive or resistant) and the possible contribution of other factors like age, sex and environments in the development of steroid resistance. A total number of 55 asthmatics and 28 normal subjects were enrolled in the study. Patients were diagnosed clinically as steroid sensitive (SSA) and steroid resistant (SRA) and blood samples were taken from all subjects included in the study for the measurement of immunoglobulins (IgA, IgG, IgM and IgE), complement proteins (C3 and C4), interleukins (Il-2 and Il-4), and total and differential WBC counts.The results showed no age, sex and residence dependency of acquired steroid resistance, while smoking habit (and may be the atopic allergy) constitute marked predisposing factors. The level of IgA and IgE were high in both SRA and SSA, while IgG level was low in SRA. Complement proteins (C3 and C4) were not differ in asthmatic patients in comparison with control group. The interesting results were those concerning interleukins. The levels of IL-2 and IL-4 were very high in SRA than in SSA. These are parallel with high lymphocyte and neutrophil counts in blood samples of those patients.In conclusion, beside clinical diagnostic features concerning the dose and duration of therapy with glucocorticoids, monitoring the levels of IL-2 and IL-4 could provide additional laboratory diagnostic measures for the convincing decision that asthma is steroid resistant.

Key words: steroid resistant asthma, steroid sensitive asthma, IL-2, IL-4

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Antimicrobial activity Study Via some new Schiff bases for Trimethoprim
...Show More Authors

This search reports the synthesis of some new series of Schiff base compounds for trimetheprim derivatives which known high been known as a medicinal effectiveness. Trimetheprim was condensed with several substituted aldehydes compounds.(4-dimethyl amine benzaldehyde , propanal , salicaldehyde, 2.4 dimethoxy benzaldehyde and 4- methyl benzaldehyde) to obtain Schiff base products(1a-5a) and several substituted ketones compound (4-aminoacetophenone,4-chloroacetophenone, isobutyleketone, acetylacetone and acetophenone) to obtain Schiff base products(6b-10b) in ethanol in the presence of concentrated sulphuric acid as a catalyst to yield the Schiff base. The structure of synthesized compounds has been established on the basis of their Chemical

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
Comparison Between Mechanical and Non Mechanical Bowel Preparation Prior To Elective Colorectal Surgery
...Show More Authors

Background: Bowel preparation prior to
colonic surgery usually includes antibiotic
therapy together with mechanical bowel
preparation which may cause discomfort to the
patients, prolonged hospitalization and water
& electrolyte imbalance.
Objective: to assess whether elective colon
and rectal surgery may be safely performed
without preoperative mechanical bowel
preparation.
Method: the study includes all patients who
had elective large bowel resection at Medical
City – Baghdad Teaching Hospital between
Feb, 2007 to Jan, 2010. Emergency operations
were not included. The patients were randomly
assigned to the 2 study groups (with or without
mechanical bowel preparation.
Results: A to

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 28 2019
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
Heuristic Initialization And Similarity Integration Based Model for Improving Extractive Multi-Document Summarization
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Sat Dec 10 2016
Journal Name
Misan Journal For Physical Education Sciences
Designing and Standardizing two tests for motor coordination timing for youth basketball players
...Show More Authors

Designing and Standardizing two tests for motor coordination timing for youth basketball players Research submitted by Prof. Faris sami & asst. prof. Wasan hanoon ali & asst. prof. Feras muttasher Baghdad University-College Of Physical Education and Sport Sciences Motor coordination in basketball is considered one of the most important factors for success in skill performance accuracy and speed due to the defensive and offensive situations of the game. The problem of the research lies in the lack of tests that can specify the growth of motor coordination through which the relative change for a number of players can be noticed due to practice and training. The subjects of the research were (30) young league players of National Center for gif

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (230)
Crossref (227)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (33)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Intelligent Systems
Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
...Show More Authors
Abstract<p>Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co</p> ... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref