Preferred Language
Articles
/
dhbDrosBVTCNdQwCqdY7
Association of tumor necrosis factor-alpha promoter region gene polymorphism at positions -308G/A, -857C/T, and -863C/A with etanercept response in Iraqi rheumatoid arthritis patients
...Show More Authors

Objectives: This study aims to evaluate the association between polymorphisms in the promoter region of the tumor necrosis factor-alpha (TNF-α) gene at locations -308G/A, -857C/T, and -863C/A with the tendency of being non-responder to etanercept.

Patients and methods: Between October 2020 and August 2021, a total of 80 patients (10 males, 70 females; mean age: 50 years; range, 30 to 72 years) with rheumatoid arthritis (RA) receiving etanercept for at least six months were included. The patients were divided into two groups responders and non-responders, based on their response after six months of continuous treatment. Following polymerase chain reaction amplification of the extracted deoxyribonucleic acid, sequencing by Sanger method was performed to identify the polymorphism at the TNF-α promoter region.

Results: In the responder group, the GG genotype of (-308G/A) and the AA genotype of (-863C/A) were both significantly present. The CC genotype of (-863C/A) was significantly present in the non-responders group. The CC of (-863C/A) SNP was the only genotype that appeared to increase the likelihood of being resistant to etanercept. The GG genotype of (-308G/A) was negatively correlated with the likelihood of being a non-responder. The (-857CC) and (-863CC) genotypes were significantly more prevalent in the non-responders group.

Conclusion: The presence of the (-863CC) genotype, alone or in combination with (-857CC), is linked to an increased likelihood of becoming a non-responder to etanercept. The GG genotype of -308G/A and the AA genotype of -863C/A significantly increase the likelihood of becoming responder to etanercept.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Using Adaptive Neuro Fuzzy Inference System to Predict Rate of Penetration from Dynamic Elastic Properties
...Show More Authors

Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal.  The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 06 2025
Journal Name
Aip Conference Proceedings
Enhance the performance of the wind turbine blade based on the blade element momentum theory
...Show More Authors

In order to improve the effectiveness, increase the life cycle, and avoid the blade structural failure of wind turbines, the blades need to be perfectly designed. Knowing the flow angle and the geometric characteristics of the blade is necessary to calculate the values of the induction factors (axial and tangential), which are the basis of the Blade Element Momentum theory (BEM). The aforementioned equations form an implicit and nonlinear system. Consequently, a straightforward iterative solution process can be used to solve this problem. A theoretical study of the aerodynamic performance of a horizontal-axis wind turbine blade was introduced using the BEM. The main objective of the current work is to examine the wind turbine blade’s perf

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Mon Dec 01 2025
Journal Name
Case Studies In Construction Materials
Optimized stress-strain modeling of eco-friendly fiber-reinforced concrete members using meta-heuristic algorithms
...Show More Authors

Eco-friendly concrete is produced using the waste of many industries. It reduces the fears concerning energy utilization, raw materials, and mass-produced cost of common concrete. Several stress-strain models documented in the literature can be utilized to estimate the ultimate strength of concrete components reinforced with fibers. Unfortunately, there is a lack of data on how non-metallic fibers, such as polypropylene (PP), affect the properties of concrete, especially eco-friendly concrete. This study presents a novel approach to modeling the stress-strain behavior of eco-friendly polypropylene fiber-reinforced concrete (PFRC) using meta-heuristic particle swarm optimization (PSO) employing 26 PFRC various mixtures. The cement was partia

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Sep 24 2014
Journal Name
International Journal Of Environmental Science And Technology
Removal of copper ions from contaminated groundwater using waste foundry sand as permeable reactive barrier
...Show More Authors

Scopus (16)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Mar 29 2021
Journal Name
Eureka: Physics And Engineering
INVESTIGATION ON THE AIR-GAS CHARACTERISTICS OF AIR-HYDROGEN MIXER DESIGNED FOR DUAL FUEL – ENGINES
...Show More Authors

High smoke emissions, nitrogen oxide and particulate matter typically produced by diesel engines. Diminishing the exhausted emissions without doing any significant changes in their mechanical configuration is a challenging subject. Thus, adding hydrogen to the traditional fuel would be the best practical choice to ameliorate diesel engines performance and reduce emissions. The air hydrogen mixer is an essential part of converting the diesel engine to work under dual fuel mode (hydrogen-diesel) without any engine modification. In this study, the Air-hydrogen mixer is developed to get a homogenous mixture for hydrogen with air and a stoichiometric air-fuel ratio according to the speed of the engine. The mixer depends on the balance between th

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Molecular study to the fungus Neosetophomasamarorum was isolated from Al Chabaish marsh, South of Iraq
...Show More Authors

IA Ali, FK Emran, DF Salloom, Annals of the Romanian Society for Cell Biology, 2021

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
Removal of Methyl Orange from Aqueous Solutions by Adsorption Using Corn Leaves as Adsorbent Material
...Show More Authors

A comparative study was done on the adsorption of methyl orange dye (MO) using non-activated and activated corn leaves with hydrochloric acid as an adsorbent material. Scanning electron microscopy (SEM) and Fourier Transform Infrared spectroscopy (FTIR) were utilized to specify the properties of adsorbent material. The effect of several variables (pH, initial dye concentration, temperature, amount of adsorbent and contact time) on the removal efficiency was studied and the results indicated that the adsorption efficiency increases with the increase in the concentration of dye, adsorbent dosage and contact time, while inversely proportional to the increase in pH and temperature for both the treated and untreated corn leaves. The equi

... Show More
View Publication
Crossref (19)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Advanced Pharmacy Education And Research
Co-surfactant effect of polyethylene glycol 400 on microemulsion using BCS class II model drug
...Show More Authors

View Publication
Scopus (28)
Crossref (24)
Scopus Crossref