Tumours in pets occur naturally and are common in dogs as they are in humans. Tumours of the alimentary system have been reported in animals, although less frequently. Food patterns and specific diet components could have a big role in such tumour occurrence. Therefore, the aim of this study was to investigate the clinical signs and inspect the neoplasm lesions of the gastrointestinal (GI) tract grossly and histopathologically in dogs in Baghdad, Iraq, and to see whether pet diets had any tumourigenic effect. Throughout two years sixteen dogs were referred to Teaching Animal Hospital and private clinics at Baghdad city with masses in (GI) tract. Males and large size breeds were more likely to be affected with GI tumours. Half of the cases aged 5-10 years and belonged to German Shepherd, while the other half involved the other breeds (i.e. Belgian Malinois, Labrador, Pointer GSP and Terrier) equally. Biopsies were taken from the tumour tissues for histological examination. Clinically, the animals presented general signs of digestive system abnormalities, like difficult defecating, bloody stool, lethargy and weight loss. Grossly, the tumours varied in their sizes from <3 cm to >5 cm in diameter, and the most frequent site of occurrence (10 out of 16 cases) was in the large intestine. Histologically, most tumours reported were malignant, and included adenocarcinomas (6/16) followed by leiomyosarcoma (4/16), adding to 2/16 belonged to carcinoid tumour. However, lipoma and viral papilloma (4/16) were also registered as benign tumours. In conclusion, tumours of canine digestive system do exist but rare. Healthy nutrition of dogs may prevent this type of cancer by consuming enough amount of raw meat, little artificial food, e.g. kibble along with some vegetables and fruits. Additionally, the information gained from dogs could be used to suspect and test the effect on humans as they have strong pathophysiology similarities.
This study is the first and new record to the spider Scytodes univittata Simon, 1882 (Araneae:Scytodidae)in Baghdad /Iraq , the spiders Scytodes univittata were collect from province Baghdad in Iraq , genus Scytodes belong to the family Scytodidae it is one of the most family are wide distribution around the world have 6 eyes and are slow moving , the genus Scytodes are known from the names spitting spiders ,.Female Scytodes univittata can be characteristic by :large round cephalothorax length:4.45 mm , abdomen length 3.50, total body length 7.95 mm and V-shaped of fovea, scutela triangle and large with long thin legs femur I have two row of spines then spineless are in IV femur , coloration is yello
... Show MoreThe present study aims at assessing the status of heavy metals such as nickel, cadmium and lead to pollute some areas of Baghdad city. In this study the spectral absorption device and the program ArcGIS 10.2 will using. The soil samples were taken from five different locations in Baghdad, including Ameriya, Kadhimiya, Palestine Street, Jadiriyah and Taji for the 5cm depth layer on both sides of the road. This work on soil samples has been completed in two :phases 1 - Preparation of samples: For the purpose of converting solid material into a extract containing elements in the form of single ions can be estimated by the device 2-Determination of elements: Samples prepared to the device
The fact of having Journalism being open to people from different orientations professions, working as journalists requiring protection just to spread corruption, is one of the biggest threats faced by journalism.
Journalists noticed the spread of unprincipled journalists with no journalistic ethics amongst them, they tried to protect their profession from these corrupt outsiders who might annihilate the mighty of journalism. The principles of the journalism profession known as journalistic ethics, are one the most important formulations of the law concluded by the journalists and those concerned by the the profession, they were then published in public in order to prove their professionalism, especially for those who don’t und
... Show MoreThe research falls in to three sections: the first section has two parts; the first one includes a general description of the research: its problem, aim, limitations, methodology, and the terminological definition. The second part presents historical background of the weekly school speeches in Iraq and their types. Section Two has two parts: the first is about the principles of writing weekly speeches, their elements, and principals, their conditions. As for the second part, it is about introducing four samples of weekly school speeches distributed as two taken from Al-karkh sector and two taken from Al-rusafa'a sector. The third section: analyzing the content of the sample and giving a short historical background abo
... Show MoreThe unemployment is considered from the most danger problems that our society face them in current time & in the near future , because it makes prodigality for element of human being , particularly age of youth who have ability to work & producing , that resulted in negative effects forecast to dire consequences social and economical dangers . In the same time as will be stated in our explanation in the following in our research , because the unemployment has ability to help to prepare good environment to grow crime , actions of violence that mostly are main cause to decrease living level of majority of citizens & in increasing numbers who became under poverty , the unemployment is economical problem as it is psycholo
... Show MoreThe purchase of a home and access to housing is one of the most important requirements for the life of the individual and the stability of living and the development of the prices of houses in general and in Baghdad in particular affected by several factors, including the basic area of the house, the age of the house, the neighborhood in which the housing is available and the basic services, Where the statistical model SSM model was used to model house prices over a period of time from 2000 to 2018 and forecast until 2025 The research is concerned with enhancing the importance of this model and describing it as a standard and important compared to the models used in the analysis of time series after obtaining the
... Show MoreBackground: Oral tumors are one of the most challenging
tumors regarding their good prognosis in early diagnosis and
very difficult control in advancing stages.
Objectives: To study the prevalence, types and clinical
presentation of oral tumors in comparison to other oral
lesions among patients attending ENT clinic.
Al-Kindy Col Med J 2008 Vol.5(1) Original Article 11
Methods: This study included 534 patients with different
oral complains attending ENT clinics in AI-Yarmouk
Teaching Hospital, and AI-Kindy Teaching Hospital -
Baghdad, in the period from 1st jan1999 till 31th des 2006 (8
years interval).
Results: The results of this study showed that the prevalence
of malignant lesions was 13.5% (72 o
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More