Background: Numerous epidemiological studies were conducted in Iraq, concerning dental caries and related etiological factors however; most of these studies were concerned with pre-and primary school children and/or those at index ages (12-15years old). At the time studies regarding older ages are very limited. This study was done to determine the prevalence and severity of dental caries and treatment need among high schools girls (16-18 years old) in Al-Mussayb city, Babylon Governorate. Thus, it can be considered as a base line data that allows studying dental caries among permanent dentition, also allows the comparison with other studies in other parts of the world. Material and Method: A total number of 900 high school girls were examin
... Show MoreThe current work aims to evaluate the association between genetic mutations in thymidylate synthetase (
Background: Lymphomas are a group of diseases caused by malignant lymphocytes that accumulate in lymph nodes and cause the characteristic clinical features of lymphadenopathy. Intercellular adhesion molecule-1 (ICAM-1) (CD54) is a transmembrane glycoprotein belonging to the immunoglobulin superfamily of adhesion molecules. Cortactin was first identified as one of the major substrates for src kinase. because it localized to Cortical actin structures, The aims of this study was to evaluate and compare the immunohistochemical of ICAM-1 expression as cell adhesion molecule marker and Cortactin expression as invasive marker. Material and Methods: This study was performed on (68) formalin-fixed, paraffin-embedded blocks, histopathologically diagn
... Show MoreThe aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreAllah's wisdom has necessitated concentrating un human nature the ability of
mediation and forethought .among the aspect of this ability is the recognition of the
relationship between causes and effects issues and reasons behind them and the
sensing of similarities and differences and distinguish the connection between the
subjects and characteristics and the innate perception of material and immaterial good
and bad.
Allah's wisdom has willed not to make his law away from the nature of people of
discovering the relationship between things and their causes, or similarity between
things and their counterparts to use the Quranic text to convince reason and to enable
reason to realize the wisdom quranic text within
The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
Background: Acute myeloid leukemia (AML) is an adult leukemia characterized by rapid proliferation of undifferentiated myeloid precursors, leading to bone marrow (BM) failure and impaired erythropoiesis. The p53 tumor suppressor protein regulates cell division and inhibits tumor development by preventing cell proliferation of altered or damaged DNA. It orchestrates various cellular reactions, including cell cycle arrest, DNA repair, and antioxidant properties. Objectives: To investigate the relationship of P53 serum level with hematological findings, remission, and survival status in de novo AML patients. Methods: This is a cross-sectional study that enrolled 63 newly diagnosed de novo AML patients, and 15 sex- and age-matched healt
... Show More