Background: Salivary tumors are uncommon, being of low incidence worldwide. This study aimed to assess cases collected in this series of salivary gland tumors in regard to histopathological typing, in relation to age, site and gender. Materials and methods: This is a retrospective study; cases were collected from public and private laboratories. A total number of 171 cases were collected. The slides were reviewed and reclassified for histopathological typing according to WHO classification 2005. Results: Benign tumors were more common than malignant tumors. The most common histological type was benign mixed tumor, followed by Warthin’s tumor. The most common malignant tumor was adenoid cystic carcinoma. One hundred twenty three cases out of 171 cases developed in the parotid, the most common site for salivary tumors, with a low risk for malignancy, while minor salivary glands show higher risk for malignancy. Salivary tumors developed in females more than males with a ration 1.4:1, the peak incidence in the sixth and seventh decades for both benign and malignant tumors. There was no significant difference between right and left tumors, bilateral tumors were uncommon. Conclusions: The results of this study reveal similarity to the findings of other studies on salivary tumors done in Iraq and the neighboring countries.
This article investigates the decline of language loyalty in the age of audiovisual nearness. It is a socio-linguistic review of previous literature related to language disloyalty. It reviews the current theoretical efforts on the impact of audiovisual nearness created by social media and language loyalty. The descriptive design is used. The argument behind this review is that the audiovisual nearness provided by social media negatively affects language loyalty. This article concludes that the current theoretical efforts have paid much attention to the relationship between the audiovisual nearness and language loyalty. Such efforts have highlighted the fact that the social media platforms have provided unprecedented nearness that provoke in
... Show MoreThe therapeutic value of the phenolic component and pure thymol was well known; this study comprised the extraction of crude phenol from two plants (Thymus vulgaris and Artemisia annua) which contain thymol with pure thymol and evaluate their effect on hematological and histological by using three different concentrations of each plant extract and pure thymol to tested them on lab mice. All the mice were allowed free access to water and feed for 21 days in laboratory conditions; orally, pure water was administered to the control mice (group I), while groups II, III, and IV were given orally with T. vulgaris, A. annua, combination of last two crude phenol plant extract 50:50 and pure thymol respectively. The levels of CHO, TRI, and HDL were
... Show MoreThis study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce
... Show MoreBackground: Periodontal diseases are initiated by microbial plaque, which accumulates in the sulcular region and induces an inflammatory response. The Receptor activator of nuclear factor-kappa B ligand / osteoprotegerin (RANKL/OPG) axis is involved in the regulation of bone metabolism in periodontitis, in which an increase in receptor activator of nuclear factor-kappa B ligand or a decrease in osteoprotegerin can tip the balance in favor of osteoclastogenesis and the resorption of alveolar bone that is the hallmark of periodontitis. This study was performed to investigate the role of salivary levels of RANKL and OPG in pathogenesis of chronic periodontitis. Subjects and Methods: Fifty five subjects with chronic periodontitis with ages rang
... Show MoreThe presented work shows a preliminary analytic method for estimation of load and pressure distributions on low speed wings with flow separation and wake rollup phenomena’s. A higher order vortex panel method is coupled with the numerical lifting line theory by means of iterative procedure including models of separation and wake rollup. The computer programs are written in FORTRAN which are stable and efficient.
The capability of the present method is investigated through a number of test cases with different types of wing sections (NACA 0012 and GA(W)-1) for different aspect ratios and angles of attack, the results include the lift and drag curves, lift and pressure distributions along the wing s
... Show MoreIn this work, we focused on studying 1,4-naphthoquinones and their derivatives, and knowing the methods of preparing them using different auxiliary agents and forming derivatives containing heterocyclic rings, active groups and saturated rings containing heterogeneous elements . In addition, due to their strong antibacterial, antifungal and anticancer activity, 1,4-naphthoquinone compounds biological importance and are considered a source of various pharmaceutical compounds.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show More