In this study, aluminum nanoparticles (Al NPs) were prepared using explosive strips method in double-distilled deionized water (DDDW), where the effect of five different currents (25, 50, 75, 100 and 125 A) on particle size and distribution was studied. Also, the explosive strips method was used to decorate zinc oxide particles with Al particles, where Al particles were prepared in suspended from zinc oxide with DDDW. Transmission electron microscopy (TEM), UV-visible absorption spectroscopy, and x-ray diffraction are used to characterize the nanoparticles. XRD pattern were examined for three samples of aluminum particles and DDDW prepared with three current values (25, 75 and 125 A) and three samples prepared with the same currents for zinc oxide suspension with aluminum particles and DDDW. It was observed that when increasing the percentage of prepared Al particles in the suspension consisting of zinc oxide and DDDW, the energy gap of zinc oxide gradually decreased in the samples. Transmission electron microscopy (TEM) analysis is conducted to examine the size, shape, and aggregation of the nanoparticles. The TEM images reveal that the Al nanoparticles exhibit a quasi-spherical shape. The particle size distribution analysis shows that the average crystal size of Al decreases with an increase in the detonation current. This method yields particle with average sizes within the range of 20 to 90 nm. When decorating zinc oxide particles by generating Al nanoparticles inside a suspension of zinc oxide and DDDW, the size of the resulting particles increases with increasing current. © ALL RIGHTS RESERVED.
The objective of the study: is to investigate the correlations between the HER2 neu gene status with the clinicopathological parameters of infiltrative breast carcinoma. A total of seventy four Iraqi breast cancer patients were collected from one center (Department of Public Health) paraffin blocks were collected from histopathology department central public health laboratories, Bagdad, Iraq from 2014-2015. The cases which has been taken included invasive ductal and invasive lobular carcinoma type Women age were ranged from 24-80 years old. Evaluation of Her-2/neu gene amplification status was done using FISH and CISH techniques that showed a significant correlations with clinicopathological parameters.
Abstract Background: The human epidermal growth factor receptor 2(HER2) proto-oncogene is overexpressed or amplified in approximately 15%-25% of invasive breast cancers. Approximately 35% of HER2-amplified breast cancers have coamplification of the topoisomerase II-alpha (TOP2A) gene encoding an enzyme that is a major target of anthracyclines. Hence, the determination of genetic alteration (amplification or deletion) of both genes is considered as an important predictive factor that determines the response of breast cancer patients to treatment. The aims of this study are to determinate TOP2A status gene amplification in a set of Iraqi patients with breast cancer that have had an equivocal (2+) and positive HER2/neu by immunohistochemistry
... Show MoreNonmissile penetrating spine injury (NMPSI) represents a small percent of spinal cord injuries (SCIs), estimated at 0.8% in Western countries. Regarding the causes, an NMPSI injury caused by a screwdriver is rare. This study reports a case of a retained double-headed screwdriver in a 37-year-old man who sustained a stab injury to the back of the neck, leaving the patient with a C4 Brown-Sequard syndrome (BSS). We discuss the intricacies of the surgical management of such cases with a literature review.
PubMed database was searched by the following combined formula of medical subjects headings,
The Electro-Fenton oxidation process is one of the essential advanced electrochemical oxidation processes used to treat Phenol and its derivatives in wastewater. The Electro-Fenton oxidation process was carried out at an ambient temperature at different current density (2, 4, 6, 8 mA/cm2) for up to 6 h. Sodium Sulfate at a concentration of 0.05M was used as a supporting electrolyte, and 0.4 mM of Ferrous ion concentration (Fe2+) was used as a catalyst. The electrolyte cell consists of graphite modified by an electrodepositing layer of PbO2 on its surface as anode and carbon fiber modified with Graphene as a cathode. The results indicated that Phenol concentration decreases with an increase in current dens
... Show MoreCore decompression is one of the commonest used techniques in the handling of osteonecrosis of the pre-collapsed head of the femur. Core decompression had succeeded in preserving the hip joint and delaying the requisite for total hip replacement, but it had failed in the induction of osteogenesis in the necrotic area, thus augmenting core decompression with biological agents to induce osteogenic activity. To assess the effects of platelet-rich plasma in non-traumatic avascular necrosis of the hip joint (early stage) after core decompression. Interventional comparative study for twenty-four patients (32 hip joints) with AVN of the head of the femur was involved in this prospective study, and they were separated into two groups of 16
... Show MoreThe Estimation Of The Reliability Function Depends On The Accuracy Of The Data Used To Estimate The Parameters Of The Probability distribution, and Because Some Data Suffer from a Skew in their Data to Estimate the Parameters and Calculate the Reliability Function in light of the Presence of Some Skew in the Data, there must be a Distribution that has flexibility in dealing with that Data. As in the data of Diyala Company for Electrical Industries, as it was observed that there was a positive twisting in the data collected from the Power and Machinery Department, which required distribution that deals with those data and searches for methods that accommodate this problem and lead to accurate estimates of the reliability function,
... Show MorePoverty is defined as a low standard of living in the sense that a poor person can not afford a minimum standard of living. The phenomenon of poverty is one of the most serious problems that must be dealt with seriously. This phenomenon has persisted in Iraq for decades because of the harsh economic conditions and unstable security conditions due to the crises it has faced since 2013. This study requires much study and analysis. And rural areas as a special case. In this study, the researcher examined the poverty line as a criterion in estimating the poverty indicators, which include (poverty percentage H, poverty gap PG, poverty intensity PS), based on the continuous social and economic survey data for households in 2014. The ma
... Show MoreThe field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More