Background: Salivary tumors are uncommon, being of low incidence worldwide. This study aimed to assess cases collected in this series of salivary gland tumors in regard to histopathological typing, in relation to age, site and gender. Materials and methods: This is a retrospective study; cases were collected from public and private laboratories. A total number of 171 cases were collected. The slides were reviewed and reclassified for histopathological typing according to WHO classification 2005. Results: Benign tumors were more common than malignant tumors. The most common histological type was benign mixed tumor, followed by Warthin’s tumor. The most common malignant tumor was adenoid cystic carcinoma. One hundred twenty three cases out of 171 cases developed in the parotid, the most common site for salivary tumors, with a low risk for malignancy, while minor salivary glands show higher risk for malignancy. Salivary tumors developed in females more than males with a ration 1.4:1, the peak incidence in the sixth and seventh decades for both benign and malignant tumors. There was no significant difference between right and left tumors, bilateral tumors were uncommon. Conclusions: The results of this study reveal similarity to the findings of other studies on salivary tumors done in Iraq and the neighboring countries.
Maintenance of hospital buildings and its management are regarded as an important subject which needs attention because hospital buildings are service institutions which are very important to a society, requiring the search for the best procedure to develop maintenance in hospitals. The research is aimed to determine an equation to estimate the annual maintenance cost for public hospital. To achieve this aim, Al-Sader City Hospital maintenance system in Al-Najaf province has been studied with its main elements through survey of data, records and reports relating to maintenance during the years of the study 2008-2014 and to identify the strengths, weaknesses, opportunities and threat points in the current system through Swat analysi
... Show MoreThe reaction of [Benzoyl hydrazine] with [Diphenyl mono oxime] and Glacial acetic acid was carried out in methanol gave a new tridentate ligand [Benzoic acid (2-hydroxyimino- 1, 2-diphyneylethylidene) - hydrazide]. This ligand was reacted with some metal ions (Fe(II), Co(II), Ni(II), and Cu(II)) in methanol with (1:1) metal : ligand ratio to give a series of new complexes of the general formula [M(L)Cl2.H2O], where M= Fe(11), Co(11), Ni(11) and Cu(11). All compounds were characterized by spectroscopic methods (I.R, UV-Vis), elemental microanalysis (C.H.N), atomic absorption, magnetic susceptibility, and conductivity measurements. From the obtained data the proposed molecular structures were suggested for the complexes of Fe
... Show MoreThe reaction of [Benzoyl hydrazine] with [Diphenyl mono oxime] and Glacial acetic acid was carried out in methanol gave a new tridentate ligand [Benzoic acid (2- hydroxyimino- 1, 2-diphyneylethylidene) - hydrazide]. This ligand was reacted with some metal ions (Fe(II), Co(II), Ni(II), and Cu(II)) in methanol with (1:1) metal : ligand ratio to give a series of new complexes of the general formula [M(L)Cl2.H2O], where M= Fe(11), Co(11), Ni(11) and Cu(11) . All compounds were characterized by spectroscopic methods (I.R, UV-Vis), elemental microanalysis (C.H.N), atomic absorption, magnetic susceptibility, and conductivity measurements. From the obtained data the proposed molecular structures were suggested for the complexes of Fe (II), Co (II)
... Show MoreXanthomonas axonopodis pv glycines (Xag) is a pathogen that causes pustule disease in soybeans. Many
techniques for controlling this disease have been widely developed, one of which is the use of biological agents.
Bacillus sp. from the soybean phyllosphere is a biological agent that has the potential to suppress the
development of pustule disease. One of the biological control mechanisms is through biochemical induction
of plant resistance which includes the accumulation of phenols, salicylic acid compounds, and peroxidase
enzymes. Bacillus subtilis JB12 and Bacillus velezensis ST32 are two bacteria isolated from the soybean
phyllosphere which have previously been known to suppress Xag through an anti
Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MorePV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building 220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More
