Background: The aim of this study was to evaluate the expression of fibroblast growth factor-2 and Heparanase in salivary pleomorphic adenoma, and to correlate the two studied markers with each other and with clinicopathological parameters including: age, sex, tumor site and histopathological presentation. Methods: Sections of twenty five formalin-fixed paraffin embedded tissue blocks specimens of salivary pleomorphic adenoma were immunostained using monoclonal antibodies (Fibroblast growth factor-2 and Heparanase) to assess their expression in this tumor. Results: The expression of fibroblast growth factor-2 and Heparanase were positive in all pleomorphic adenoma cases (100%). The positive expression of fibroblast growth factor-2 was signi
... Show MoreCOVID-19 is a unique viral infectious illness that causes a variety of symptoms and health hazards, particularly to the respiratory system and has been declared a worldwide pandemic. The disease is characterized by a cytokine release in severe conditions. Interleukin-6 (IL-6), a proinflammatory cytokine, mediates an important immunomodulatory process. Also, vitamin D was identified to have a role in the innate immunity of individuals. Our study was designed to find the role of IL-6 and vitamin D in COVID-19 patients, as well as, to see whether there is a link between vitamin D deficiency and cytokine syndrome development. The study included 90 COVID-19 patients and 30 control people from Baghdad, Iraq. The age of the participants was non-s
... Show MoreBackground: Cell adhesion molecules are protein entities that are located on the cell surface. The vascular cell adhesion molecule-1 (VCAM-1) and intercellular adhesion molecule-1 (ICAM-1) expression is related to type 2 diabetes mellitus (T2DM) with dyslipidemia. Objectives: To determine the levels of VCAM-1 and ICAM-1 in T2DM patients with dyslipidemia and to explore the relationship between VCAM-1 and ICAM-1 and the development of dyslipidemia in T2DM patients. Patients and methods: The study included 150 individuals with an age range of (35-55) years. Patients with diabetes for more than 5 years were excluded. Fifty healthy individuals constituted Group 1 (G1), fifty patients with T2DM constituted Group 2 (G2), and fifty T2DM p
... Show MoreInflammatory bowel disease includes both Crohn’s disease and ulcerative colitis, is a chronic, progressive relapsing disease of gastrointestinal tract that require long-term treatment or maintenance therapy. Taking patient’s beliefs about the prescribed medication in consideration had been shown to be an important factor that affects compliance of the patient in whom having positive beliefs is a prerequisite for better compliance. The aim of the current study was to investigate and assess beliefs about medicines among a sample of Iraqi patients with inflammatory bowel disease and to determine possible association between these beliefs and some patient-specific factors.
This study is a cross-sectional study carried out o
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show More