Pleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subjects (47.7%), with an average age of 36.9 years. The palate was the most frequently involved site (64.5%), followed by the parotid gland (31.8%). Microscopically, there were 52 classic, 53 cellular, and only 27 myxoid PAs. Plasmacytoid cells were commonly observed as myoepithelial cells, followed by spindle cells. Trabeculae patterns were the most common archetypes created by the epithelial cells. Myxoids with chondroid mesenchymal-like tissues were the most commonly noticed stromal tissue, mostly making the nominated myxo-chondroid stroma. Conclusion: PAs are neoplasms with a wide range of histological characteristics, including a diversity of cell morphology such as plasmacytoid, spindle, and cuboidal cells, as well as duct-like areas and a high incidence of myxochondroid stroma. Most PAs do not exhibit atypical features such as increased mitotic activity, cellular pleomorphism, or necrosis.
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreStructural buildings consist of concrete and steel, and these buildings have confronted many challenges from various aggressive environments against the materials manufactured from them. It contains high water levels and buildings whose concrete cover may be damaged and thus lead to the deterioration and corrosion of steel. It was important to have an alternative to steel, such as the glass fiber reinforced polymer (GFRP), which is distinguished by its great effectiveness in resisting corrosion, as well as its strong tensile resistance. Still, one of its drawbacks is that it has a low modulus of elasticity. This research article aims to conduct a numerical study using the nonlinear fi
In this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is
... Show MoreHighway network could be considered as a function of the developmental level of the region, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure. The main theme of this thesis is to show the characteristics of the regional highway network of Anbar and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this thesis tries to draw an imagination for the connection between highway network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure of the region. This thesis aiming also to determine the natu
... Show Moreأن الطرق اللامعلمية هي نوع من الطرق الاحصائية الاستدلالية التي يمكن استخدامها للتوصل إلى أستنتاجات لذا كان حرص المؤلف على أصدار هذا الكتاب والذي يعمل على توضيح ( لماذا ؟ ومتى ؟ وكيف ؟ ) تستخدم كل طريقة إحصائية . وبإمكان القاريء سواء أكان أستاذا ً جامعيا ً أو باحثا ً أو طالبا ً في الدراسات العليا ( الماجستير والدكتوراه ) أو طالبا ً في الدراسات الأولية أن يتتبع جميع الخطوات لحساب كل قانون إحصائي وبدءا ً من عملية إدخ
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreDetermining the aerodynamic characteristics of iced airfoil is an important step in aircraft design. The goal of this work is to study experimentally and numerically an iced airfoil to assess the aerodynamic penalties associated with presence of ice on the airfoil surface. Three iced shapes were tested on NACA 0012 straight wing at zero and non-zero angles of attack, at Reynolds No. equal to (3.36*105). The 2-D steady state continuity and momentum equations have been solved utilizing finite volume method to analyze the turbulent flow over a clean and iced airfoil. The results show that the ice shapes affected the aerodynamic characteristics due to the change in airfoil shape. The experimental results show that the horn iced airfoil
... Show MoreNovel artificial neural network (ANN) model was constructed for calibration of a multivariate model for simultaneously quantitative analysis of the quaternary mixture composed of carbamazepine, carvedilol, diazepam, and furosemide. An eighty-four mixing formula where prepared and analyzed spectrophotometrically. Each analyte was formulated in six samples at different concentrations thus twentyfour samples for the four analytes were tested. A neural network of 10 hidden neurons was capable to fit data 100%. The suggested model can be applied for the quantitative chemical analysis for the proposed quaternary mixture.
This study discusses the Critical Discourse Analysis of 2012 American Presidential Election Debate’. The researcher adopts a model proposed by Van Dijk’s (2006 d). Six ideological categories have been selected within the overall strategies of the ideological square are used. The categories are of three levels of discourse structure : (the meaning, the argumentation, and the rhetoric) .They have shown effective criteria for detecting the most disguised systems of racism and manipulation.
Based on the analysis, it can be concluded that the elite discourses of candidates contribute to the reproduction of domination, Orientalism, and Islamophobia. This can be appl
... Show Morehe aim of the research is to clarify the meanings and connotations of (Semitic), and to identify the peoples that fell under this name according to historical data, biblical texts and Qur’anic news. International sympathy on the one hand and on the other hand controlling the land of Palestine and giving them international legitimacy to grow their entity according to global support and sympathy with their alleged slogan (anti-Semitism), which revolves around the oppression of the Jews.