Background: The aim of this study was to evaluate the expression of fibroblast growth factor-2 and Heparanase in salivary pleomorphic adenoma, and to correlate the two studied markers with each other and with clinicopathological parameters including: age, sex, tumor site and histopathological presentation. Methods: Sections of twenty five formalin-fixed paraffin embedded tissue blocks specimens of salivary pleomorphic adenoma were immunostained using monoclonal antibodies (Fibroblast growth factor-2 and Heparanase) to assess their expression in this tumor. Results: The expression of fibroblast growth factor-2 and Heparanase were positive in all pleomorphic adenoma cases (100%). The positive expression of fibroblast growth factor-2 was significantly correlated with histopathological presentation (p-value=0.032), but it was non-significantly correlated with FGF-2 and other clinicopathological parameters (age, sex, tumor site). The positiveexpression of Heparanse was non-significantly correlated with the histopathological presentation (p-value=0.088) as well as with other clinicopathological parameters (age, sex, tumor site). Statistically significant correlation was found between the expressions of both studied markers (p-value= 0.0005). Conclusion: The fibroblast growth factor-2 and Heparanase positive expression was noted in all cases of salivary pleomorphic adenoma signifying that both fibroblast growth factor-2 and Heparanase might contribute in the biological behavior of pleomorphic adenoma. The highly significant correlation found in the expression of both markers suggests their synergistic and cooperative role in the tumorigenesis of pleomorphic adenoma.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
Background: Pneumonia is the common lower respiratory tract infection among pediatrics, especially under five; it is a common cause of under-five children morbidity and mortality. Objectives of study: To identify nurses' perceptions toward therapeutic strategies for children with pneumonia and to find the association between their perceptions and their demographic variables. Methods: A Convenient sample of 46 nurses in Baghdad city from three hospitals) Kadhimiya Hospital for Children, Central Teaching Hospital of Pediatrics, and Child Welfare Teaching Hospital) included in the study to identify their perceptions regarding pneumonia in children. Results: The results of the study present that most of the nurses' participants in the a
... Show MoreIn this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
Personal intelligence is thinking about an other person , understanding him, have sympathy and differentiation between people, and to appreciate their own point of view, with the sensitivity to their motives, behavior, and goals, so this intelligence involves dealing with a person or group of persons effectively and in normal or logical manner.
Emotions management is to achieve emotional balance by controlling the emotions continuously, self disciplining, keeping away from excitement sources, and dealing with bad situations in constructive way to achieve the psychological stability .
- the study aims
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show More