Background: Peripheral giant cell lesion (PGCL) and central giant cell lesion (CGCL) of the jaws have a distinct clinical behavior.Giant cell tumour (GCT) is a benign locally aggressive neoplasm affects the long bones. Both lesions are characterized histologically by multinucleated giant cells in a background of ovoid to spindle-shaped mesenchymal cells. The WW domain-containing oxidoreductase (WWOX) gene is located at 16q23.1–16q23.2, a region that spans the second most common human fragile site, FRA16D, at 16q23.2.The Ki-67 antigen is a nuclear protein that is associated with and may be necessary for cellular proliferation.Ki-67 protein is present during all active phases of the cell cycle (G1, S, G2, and mitosis), but is absent from resting cells (G0). This study aimed to evaluate and compare immunohistochemical expression of tumor suppressor gene (WWOX) and proliferative marker (ki67) in giant cell lesions (GCLs) of the jaws and long bones. Materials and methods: Forty five retrospective paraffin embedded tissue blocks of giant cell lesions of the jaw and long bones were included in this study.Sections were stained immunohistochemically with anti WWOX and anti ki67 monoclonal antibodies. Results: Positive WWOX expression was found in 12 cases (80%), 14cases (93.3%)and12 (80%) of CGCG, PGCG and GCT studied cases respectively, with thehighest strong positive expression observed in PGCG.Positive Ki67 expression was found in 12 cases (80% ), 13cases ( 86.7 % )and10(66.7%) of CGCG,PGCG and GCT studied cases respectively with the high proliferative expression score has been recorded in PGCG .Statistically highly significant difference was found in the Ki67expression among different giant lesion types (p=0.006), whilenon-significant difference was found in WWOX expression. Non-significant correlation was found between expression of WWOXand Ki67 in CGCG, PGCG and GCT studied cases. Conclusions: Similar immunohistochemical expression of WWOX and Ki67 ingiant cell lesions of the jaw and GCT of long boneswith non-significant correlation between them in different studied lesionssuggests that those lesions may be the same disease but with different clinical behavior. Keywords: Wwox, KI67.
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreConcerns about the environment, the cost of energy, and safety mean that low-energy cold-mix asphalt materials are very interesting as a potential replacement for present-day hot mix asphalt. The main disadvantage of cold bituminous emulsion mixtures is their poor early life strength, meaning they require a long time to achieve mature strength. This research work aims to study the protentional utilization of waste and by-product materials as a filler in cold emulsion mixtures with mechanical properties comparable to those of traditional hot mix asphalt. Accordingly, cold mix asphalt was prepared to utilize paper sludge ash (PSA) and cement kiln dust (CKD) as a substitution for conventional mineral filler with percentages ranging fro
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe study using Nonparametric methods for roubust to estimate a location and scatter it is depending minimum covariance determinant of multivariate regression model , due to the presence of outliear values and increase the sample size and presence of more than after the model regression multivariate therefore be difficult to find a median location .
It has been the use of genetic algorithm Fast – MCD – Nested Extension and compared with neural Network Back Propagation of multilayer in terms of accuracy of the results and speed in finding median location ,while the best sample to be determined by relying on less distance (Mahalanobis distance)has the stu
... Show MoreA series of new imides compounds[1-4] were synthesized from reaction of tetrachlorophthalic anhydride or nitro phthalic anhydride or malic anhydride or Succinic anhydride with 4-amino benzene thiol under fusion conditions. Chloroacetic acid has been added after compounds [1-4] reacted with distilled H2O and Na2CO3, producing compounds [5-8]. In benzene, compounds [5-8] also interacted with the thionyl chloride to produce [9-12]. Poly (vinyl alcohol) was chemically modified by reacting PVA with compounds [9-12] and dimethyl formamide to produce compounds [13-16]. Iron oxide nanoparticles (IONPs) are mixed with modified PVA [13-16] to create nanocomposites [17-20]. Spectral and analytical data from synthesized compounds, such as 1
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreThe availability of low- cost adsorbent namely Al-Khriet ( a substance found in the legs of Typha Domingensis) as an agricultural waste material, for the removal of lead and cadmium from aqueous solution was investigated. In the batch tests experimental parameters were studied, including adsorbent dosage between (0.2-1) g, initial metal ions concentration between (50-200) ppm (single and binary) and contact time (1/2-6) h. The removal percentage of each ion onto Al-Khriet reached equilibrium in about 4 hours. The highest adsorption capacity was for lead (96%) while for cadmium it was (90%) with 50 ppm ions concentration, 1 g dosage of adsorbent and pH 5.5. Adsorption capacity in the binary mixture were reduce at about 8% for lead a
... Show More