Mammary tumors (CMT) in dogs in Iraq may be induced by carcinogenic war ordnance. In our study, 10 virgin un- spayed military/pet bitches aged 5-15 years presented with abnormal masses in the abdomen with painful oedema, swelling, anorexia, weight loss, weakness and mild fever. Examination of regional lymph nodes and thoracic radiography confirmed metastasis. Tumors were excised and determined to be mostly adenocarcinomas involving multiple glands, solid in texture, 5-15 cm in size, mostly in the inguinal mammary glands at stage T3: >5 cm. Microscopy confirmed presence of adenocarcinoma in 8 dogs and solid carcinoma in 2 with half of tumors being grade III. Tumors had pleomorphic hyperchromatic cell nuclei in stroma, epithelial cells of ducts with squamous metaplasia, fibrosis and infiltrates of inflammatory cells in interstitial mammary tissue. In papillary carcinomas, we also found papillary projections into glandular acini, with proliferation of epithelial cells. Gross lesions appeared as multiple ulcerated cranial abdominal masses with congestion and bloody edema. Expression of oestrogen (ER) and progesterone receptors (PR), and proliferation marker (Ki-67) were determined by immunohistochemistry. Samples were negative for ER and PR except for one PR sample which stained strongly. This dog had a small low grade tumour (3 cm) grade. Tumors from 7 dogs were strongly positive to Ki-67 localized in the nuclei of cells, but 3 tumors stained negative or weak. Follow up every 6 months for 18 months included health status, recurrence or metastasis. Only 3 dogs survived to 18 months, others died by 12 months.
Noor Oil Field is one of Iraqi oil fields located in Missan province / Amarah city. This field is not subjected to licensing rounds, but depends on the national effort of Missan Oil Company. The first two wells in the field were drilled in seventies and were not opened to production until 2009. The aim of this study is to study the possibility of using the method of gas lift to increase the productivity of this field . PROSPER software was used to design the continuous gas lift by using maximum production rate in the design.
The design was made after comparing the measured pressure with the calculated pressure, this comparison show that the method of Beggs-Brill and Petroleum Exper
... Show MoreBackground: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand
... Show MoreYouTube is not just a platform that individuals share, upload, comment on videos; teachers and educators can utilize it to the best maximum so that students can have benefits. This study aims at investigating how active and influential YouTube can be in the educational process and how it is beneficial for language teachers to enhance the skills of students. The study demonstrates different theoretical frameworks that tackle the employment of technology to enhance the learning/teaching process. It relies on the strategies of Berk (2009) for using multimedia media, video clips in particular to develop the abilities of teachers for using technology in classrooms. To achieve the objective of the study, the researchers develop a questionnair
... Show MoreAl Huweizah Marsh is considered as the largest marsh at the southern part of Iraq. About one third of the marsh is located within the Iranian territory. Iran began to construct earth dikes along the Iraqi-Iranian international borders to separate the Iranian part of the marsh. The electrical conductivity, EC, value was adopted to be the indicator for the water salinity within the marsh. A steady two-dimensional water quality routing model was implemented by using the RMA2 and RMA4 softwares within the SMS computer package to estimate the distribution of the
EC values within the marsh seasonally during the wet, moderate and dry water years. The EC distribution Patterns were estimated considering the expected two cases of the marsh futu
In most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con
... Show MoreA New developed technique to estimate the necessary six elastic constants of homogeneous laminate of special orthotropic properties are presented in this paper for the first time. The new approach utilizes the elasto-static deflection behavior of composite cantilever beam employing the famous theory of Timoshenko. Three extracted strips of the composite plate are tested for measuring the bending deflection at two locations. Each strip is associated to a preferred principal axis and the deflection is measured in two orthogonal planes of the beam domain. A total of five trails of testing is accomplished and the numerical results of the stiffness coefficients are evaluated correctly under the contribution of the macromechanic
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More