Objective:To Evaluate of Estradiol and Prolactin hormones levels for Breast Cancer women in
Baghdad City.
Methodology: The current study was conducted on 60 breast cancer women and 40 apparently
healthy subjects to evaluate the levels of estradiol and prolactin "hormones in the serum" of
({premenopausal & postmenopausal}) breast cancer and healthy controle women. Estradiol and
prolactin hormones estimated for all cases by using the IMMULITE 2000 instrument that performs
chemiluminescent immunoassays results are calculated for each sample.Data were analysed using
SPSS-18.data of two groups was comparison by the student's t-test.
Results: The results showed a non significant""(P>0.05) elevation in the –mean- serum estradiol level
of the study (premenopausal &postmenopausal ) group (54.0 + 22.8 pg/ml),(31.6 + 9 pg/ml)
respectively compared to that of control (pre& postmenopausal ) group (47.0 + 22.3 pg/ml), (28.4 +
10.7 pg/ml) respectively.while a highly significant (P<0.01) elevation of serum prolactin (30.9 + 18.5
ng/ml) ,(20.9 +15.2 ng/ml) respectively was found in study (premenopausal &postmenopausal ) group
compared to healthy control (premenopausal &postmenopausal ) group (11.7 + 10.4" ng/ml"),(8.7 +
5.1 "ng/ml") respectively.The results of this study indicate that the elevation of estradiol and prolactin
hormones may implicate these hormones in the aetiology of" breast cancer"..
Recommendations: This learn lines recommends emphasizing the necessity of cooperation between
the Ministry of Health and the Ministry of Commerce and protecting them from dangerous behavior by
providing them with sufficient support and guidance to stay away from the hormonic products and
focusing on the extension programs in the protection of the community through educating them with
the guidance programs
This study aimed to incorporate hydroxyapatite nanoparticles (nHA) or amorphous calcium phosphate nanoparticles (nACP) into a self-etch primer (SEP) to develop a simplified orthodontic bonding system with remineralizing and enamel preserving properties.
nHA and nACP were incorporated into a commercial SEP (Transbond™ plus) in 7% weight ratio and compared with the plain SEP as a control. Shear bond strengths (SBS), enamel damage, and adhesive remnant index (ARI) scores were evaluated at 24 h
The aim of this research is to study the optical properties of carbon-magnesium plasma resulting from arc discharge with explosive wire technique, where the energy gap of each of carbon and magnesium and the carbon-magnesium bond for three values of the wire exploding current (50,75,100 amperes) was studied. It was found that the energy gap for each of carbon and magnesium decreases with increasing the current, the X-ray diffraction of magnesium and the carbon-magnesium suspension was studied, and FTIR of the carbon-magnesium suspended carbon was studied for three values of the exploding current (50, 75, 100 amperes) and the type of bonds for carbon and magnesium was determined. To ob
It is very difficult to obtain the value of a rock strength along the wellbore. The value of Rock strength utilizing to perform different analysis, for example, preventing failure of the wellbore, deciding a completion design and, control the production of sand. In this study, utilizing sonic log data from (Bu-50) and (BU-47) wells at Buzurgan oil field. Five formations have been studied (Mishrif, Sadia, Middle lower Kirkuk, Upper Kirkuk, and Jaddala) Firstly, calculated unconfined compressive strength (UCS) for each formation, using a sonic log method. Then, the derived confined compressive rock strengthens from (UCS) by entering the effect of bore and hydrostatic pressure for each formation. Evaluations th
... Show MoreA Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MorePurpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro
... Show MoreThe catalytic cracking of three feeds of extract lubricating oil, that produced as a by-product from the process of furfural extraction of lubricating oil base stock in AL-Dura refinery at different operating condition, were carried out at a fixed bed laboratory reactor. The initial boiling point for these feeds was 140 ºC for sample (1), 86 ºC for sample (2) and 80 ºC for sample (3). The catalytic cracking processes were carried out at temperature range 325-400 ºC and initially at atmospheric pressure after 30 minutes over 9.88 % HY-zeolite catalyst load. The comparison between the conversion at different operating conditions of catalytic cracking processes indicates that a high yield was obtained at 375°C, according to gasoline pr
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More