Chitinase-3-like 1 protein (YKL-40) is a glycoprotein primarily produced in the arthritic joint and plays a crucial role in inflammatory processes. The aim of the study is to establish the role of YKL-40 as a biomarker for rheumatoid arthritis (RA) compared to proinflammatory biomarkers and disease activity. The study included 58 patients and 18 control. Diseases activity score (DAS-28) and clinical disease activity index (CDAI) were measured. Serum level of YKL-40, tumor necrosis factor-α (TNF-α), interleukin-1B (IL-1β), erythrocyte sedimentation (ESR), rheumatoid factor (RF), C-reactive protein (CRP), and anti-citrullinated protein antibody (ACPA) were assessed. The results showed that the median serum YKL-40 level which was 5.42 ng/ml, the TNF-a level which was 123.6 ng/ml, and the IL-1B level which was 204.365 pg/dl were significantly higher in patients compared to control 3.28 (1.58–4.99) ng/ml, 56.47 (9.38–77.01) ng/ml and 67.887 (15.493–122.689)pg/dl respectively. There was no correlation between serum YKL-40 and disease activity, while there were significant associations observed with TNF-α (r=0.5,p =0.0001) and IL-1β (r=0.41, p=0.001). YKL-40 indicating good levels of RA prediction at 2.47 ng/ml, sensitivity 87.9%, specificity 58.6%, accuracy 78.1%, PPV 80.9%, and NPV 70.8%. In conclusion, a higher level of serum YKL-40 is found in RA patients. The findings from our study suggest a strong association between YKL-40 and the proinflammatory biomarkers. As a result, these biomarkers together might play a role in RA pathogenesis, and YKL-40 may be used as a potential diagnostic biomarker for RA.
<span lang="EN-GB">Transmitting the highest capacity throughput over the longest possible distance without any regeneration stage is an important goal of any long-haul optical network system. Accordingly, Polarization-Multiplexed Quadrature Phase-Shift-Keying (PM-QPSK) was introduced lately to achieve high bit-rate with relatively high spectral efficiency. Unfortunately, the required broad bandwidth of PM-QPSK increases the linear and nonlinear impairments in the physical layer of the optical fiber network. Increased attention has been spent to compensate for these impairments in the last years. In this paper, Single Mode Fiber (SMF), single channel, PM-QPSK transceiver was simulated, with a mix of optical and electrical (Digi
... Show MoreIn this work Aquatic plant (Nile rose) was used to study adsorption of industrial dye (safranin-O from aqueous solution within several operation conditions. The dried leaves of Nile rose plant were used as adsorbents safranin-O from aqueous solution after different activations such as wet and dry enhancements. The data show increasing in dye solution removal percentage for both activation methods of the adsorbent and also dye removal percentage that was obtained by using adsorbent without any treatment with the progress contact time. The dye removal percentages at equilibrium time 40 minutes were 88.7% at non-activation, 92.3% at thermal activation, and 98.3% at acidic activation. The samples adsorbents before and after adsorption which wer
... Show MoreHydatid disease is a zoonotic infection caused by Echinococcus species. The cystic form of this infection mostly involves liver and lung. Hydatid disease of the parotid gland even in endemic regions is a very rare entity that may be easily overlooked in daily practice. Herein, I present a case report of a 60-year-old Iraqi female patient who presented with a progressively painless mass in her right parotid. It was diagnosed radiologically as a hydatid cyst and was excised successfully. Histopathologic examination of the resected specimen confirmed the hydatid cyst. This case emphasizes the importance of considering hydatidosis in the differential diagnosis of any parotid mass, especially in endemic countries.
 
... Show MoreSeepage occurs under or inside structures or in the place, where they come into contact with the sides under the influence of pressure caused by the difference in water level in the structure U / S and D / S. This paper is designed to model seepage analysis for Kongele (an earth dam) due to its importance in providing water for agricultural projects and supporting Tourism sector. For this purpose, analysis was carried out to study seepage through the dam under various conditions. Using the finite element method by computer program (Geo-Studio) the dam was analysed in its actual design using the SEEP / W 2018 program. Several analyses were performed to study the seepage across Kongele
Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show MoreObjective(s): To evaluate nurses’ Practice toward neonatal endotracheal suctioning procedure, and to determine the effectiveness of the interventional program on nurses’ practices, as well as to find out the relationship between nurses’ practice and their demographic characteristics.
Methodology: A Pre-experimental, one group design, was carried out to achieve the objectives of the current study using the evaluation approach and the implementation of the education program for the period from January 17 to June 31, 2022. A non- probability, purposive sample of (24) nurses were selected from the Neonatal Intensive Care Unit at Pediatric Teaching Hospital/ Medical City Department. A checklist w
... Show MorePolyacetal was synthesized from the reaction of PVA with para-methyoxy benzaldehyde. Polymer metal complexwas prepared by reaction with Cu, polymer blend with Chitosan was prepared through the technique of solution casting method.All prepared compounds have been characterized through FT-IR, DSC, SEM as well as the Biological activity. The FT-IR results indicated the formation of polyacetal. The DSC results indicated the thermal stability regarding prepared polymer, polymermetal complex and Chitosan polymer blends. Antibacterial potential related to synthesized polyacetal, its metal complex andChitosan blend against four types of bacteria namely, Staphylococcus aureas, Psedomonas aeruginosa, Bacillus subtilis, Escherichia coli was examined a
... Show MoreThe development of economic and environmentally friendly extractants to recover cobalt metal is required due to the increasing demand for this metal. In this study, solvent extraction of Co(II) from aqueous solution using a mixture of N,N0-carbonyl difatty amides (CDFAs) synthesised from palm oil as the extractant was carried out. The effects of various parameters such as acid, contact time, extractant concentration, metal ion concentration and stripping agent and the separation of Co(II) from other metal ions such as Fe(II), Ni(II), Zn(III) and Cd(II) were investigated. It was found that the extraction of Co(II) into the organic phase involved the formation of 1:1 complexes. Co(II) was successfully separated from commonly associated metal
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More