Systemic lupus erythematosus (SLE) is an autoimmune disease with polymorphic expression. B cells have an essential contribution in immune system activation via the production of different cytokines and functioning as potent antigen-presenting cells. Therefore, a drug that particularly targets B cells may represent an ideal therapeutic approach for SLE. Rituximab (RTX), an anti-CD20 monoclonal antibody causing transient B-cell depletion, has been used to manage SLE. This study aims to assess Rituximab effects on lupus nephritis (LN) patients when added to conventional immunosuppressants. Twenty four patients, 15-32 years old, with class III/IV/V LN were involved in this study. All were on steroids before lupus nephritis occurrence. They were given rituximab induction therapy and mycophenolate mofetil (MMF) maintenance therapy. RTX was indicated for refractory and relapsing SLE. Several investigations done before and after RTX treatment and in the last follow up (done one year after starting Rituximab). Those included protein in urine, serum creatinine, double stranded DNA, C3, C4, and Estimated Glomerular Filtration Rate (eGFR). Proteinuria decreased significantly after RTX treatment and in the last measurement (P=0.01 and P=0.001, respectively). Serum creatinine significantly decreased only in the last measurement (P=0.02). Double stranded DNA decreased remarkably after treatment (P=0.01) with a further decrease in the last measurement (P=0.006). C3 and C4 increased after treatment but the increase was significant only for C3 (P=0.002) and this increase continues till the last measurement (P=0.0006). Active urine sediments found in fifteen patients and disappeared after RTX treatment. Rituximab can be promising in treating lupus nephritis when used along with traditional immunosuppressants. It can reduce disease activity and improve renal function in such patients.
God, may He be glorified and exalted be He, has given every human being the right to life and a dignified life, and has warned against transgression against any of its sanctities without a legitimate right. No one, regardless of his status or authority, can deprive a person of his rights that the Sharia came to preserve, and whoever does that has declared all people to war, as all humanity is in solidarity. In raising the hand that is simplified to harm a person and oppress him unjustly and exalted in the land.
If this is the case, the Sharia came to establish the right of people, groups and individuals, to defend their sanctities, preserve their security, recover their usurped rights, repel the aggression of the aggressors, and oppre
And the necessity for the progress of modern societies Because the scientific and objective characteristics that characterize modern societies and distinguish them from traditional societies, Is represented by the extent of its innovative achievements in the theoretical, applied and material scientific and spiritual fields. It should be noted that quality and innovation in modern societies is based on two main pillars, Standard measures for measuring and evaluating innovations to achieve their high quality, And the dissemination of the culture of innovation to spread awareness of the importance and conditions of success, and this is done by the advanced industrial countries, However, despite the great disparity between developed industri
... Show MoreThe following research has been dealing ( Undermining Humanism in Foucault's thought and its implications in the pop art. meanings and facts which become in the process of the post-modernist.So the research's problem is to ask for undermining Humanism in Foucault's thought and how it formed through the formality of processors and the technical and stylistic and contents in pop art.. How are these technical aspects interact with each other to undermine the humanism in Foucault's mind and with system humanity, intellectual and social relations in the post-modern society . The contents of the first chapter, is the aim of the research, which aims to undermine know humanism in Foucault's mind and its implications in pop art , within the limit
... Show MoreThe bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show MoreKetoprofen has recently been proven to offer therapeutic potential in preventing cancers such as colorectal and lung tumors, as well as in treating neurological illnesses. The goal of this review is to show the methods that have been used for determining ketoprofen in pharmaceutical formulations. Precision product quality control is crucial to confirm the composition of the drugs in pharmaceutical use. Several analytical techniques, including chromatographic and spectroscopic methods, have been used for determining ketoprofen in different sample forms such as a tablet, capsule, ampoule, gel, and human plasma. The limit of detection of ketoprofen was 0.1 ng/ ml using liquid chromatography with tandem mass spectrometry, while it was 0
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show More