Preferred Language
Articles
/
jbcd-646
Immunohistochemical assessment of tumor suppressor gene Wwox in relation to proliferative marker KI67 proteins expression in giant cell lesions of the jaws and giant cell tumor of long bones
...Show More Authors

Background: Peripheral giant cell lesion (PGCL) and central giant cell lesion (CGCL) of the jaws have a distinct clinical behavior.Giant cell tumour (GCT) is a benign locally aggressive neoplasm affects the long bones. Both lesions are characterized histologically by multinucleated giant cells in a background of ovoid to spindle-shaped mesenchymal cells. The WW domain-containing oxidoreductase (WWOX) gene is located at 16q23.1–16q23.2, a region that spans the second most common human fragile site, FRA16D, at 16q23.2.The Ki-67 antigen is a nuclear protein that is associated with and may be necessary for cellular proliferation.Ki-67 protein is present during all active phases of the cell cycle (G1, S, G2, and mitosis), but is absent from resting cells (G0). This study aimed to evaluate and compare immunohistochemical expression of tumor suppressor gene (WWOX) and proliferative marker (ki67) in giant cell lesions (GCLs) of the jaws and long bones. Materials and methods: Forty five retrospective paraffin embedded tissue blocks of giant cell lesions of the jaw and long bones were included in this study.Sections were stained immunohistochemically with anti WWOX and anti ki67 monoclonal antibodies. Results: Positive WWOX expression was found in 12 cases (80%), 14cases (93.3%)and12 (80%) of CGCG, PGCG and GCT studied cases respectively, with thehighest strong positive expression observed in PGCG.Positive Ki67 expression was found in 12 cases (80% ), 13cases ( 86.7 % )and10(66.7%) of CGCG,PGCG and GCT studied cases respectively with the high proliferative expression score has been recorded in PGCG .Statistically highly significant difference was found in the Ki67expression among different giant lesion types (p=0.006), whilenon-significant difference was found in WWOX expression. Non-significant correlation was found between expression of WWOXand Ki67 in CGCG, PGCG and GCT studied cases. Conclusions: Similar immunohistochemical expression of WWOX and Ki67 ingiant cell lesions of the jaw and GCT of long boneswith non-significant correlation between them in different studied lesionssuggests that those lesions may be the same disease but with different clinical behavior. Keywords: Wwox, KI67.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Neuroquantology
Electronic Transfers and (NLO) Properties Predicted by AB Initio Methods with Prove Experimentally
...Show More Authors

Hartree-Fock (HF) method relies in the calculations of nonlinear optical properties (NLO) for benzoic acid molecule. Also, another theoretical study is conducted by using the TD-DFT Density Functional Theory through B3LYP/High Base Set 6-311++G (2d,2p) on Gaussian program09. Moreover, an experimental study has been done to obtain the electrons spectrum for benzoic acid with and without ethanol. While the experimental study is done by using UV/VIS. spectrophotometer. Energy gap values of electronic transition between HOMO and LUMO is obtained from theoretical and experimental results. Consequently, the theoretical result for determining the energy gap calculated from EHOMO-LUMO wasvery close to the results of UV / VIS. spectrum. A theoretica

... Show More
View Publication
Scopus (32)
Crossref (23)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (230)
Crossref (230)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Baghdad Science Journal
Synthesis, Characterization, Thermal Analysis Study and Antioxidant Activity for Some Metal Ions Cr (III), Fe (III), Mn (II) and Pd(II) Complexes with Azo Dye Derived from p-methyl-2-hydroxybenzaldehyde
...Show More Authors

ليكاند ازو جديد. 4-((3-formyl-2-hydroxyphenyl)diazenyl)-N-(5-methylisoxazol-3-yl)benzenesulfonamide, الليكاند المحضر استعمل لتحضير معقدات من ايونات معادن مختلفة مثل الكروم الثلاثي والمنغنيز الثنائي والحديد الثلاثي  والبلاديوم الثنائي بنسب مولية (1:1) ( ليكاند : فلز) نتائج التشخيص للمركبات يتقنيات مطيافية الاشعة فوق البنفسجية الاشعة تحت الحمراء الرنين النووي المغناطيسي البروتوني والكربوني وطيف الكتلة والتحليل الدقيق للعناصر ومحتوى الفلز وال

... Show More
View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2010
Journal Name
College Of Education Journal, Al-mustansiriyah University
Artin Characters for the Special Linear Group SL(2,p) where p is a prime number  19
...Show More Authors

Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
An Efficient Numerical Method for Solving Volterra-Fredholm Integro-Differential Equations of Fractional Order by Using Shifted Jacobi-Spectral Collocation Method
...Show More Authors

The aim of this article is to solve the Volterra-Fredholm integro-differential equations of fractional order numerically by using the shifted Jacobi polynomial collocation method. The Jacobi polynomial and collocation method properties are presented. This technique is used to convert the problem into the solution of linear algebraic equations. The fractional derivatives are considered in the Caputo sense. Numerical examples are given to show the accuracy and reliability of the proposed technique.

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Prioritized Text Detergent: Comparing Two Judgment Scales of Analytic Hierarchy Process on Prioritizing Pre-Processing Techniques on Social Media Sentiment Analysis
...Show More Authors

Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref