Preferred Language
Articles
/
LhgHyJQBVTCNdQwCPCCD
A comparative immunohistochemical expression of cytokeratin 19 in odontogenic keratocyst, dentigerous, and radicular cysts
...Show More Authors

Background: Odontogenic cysts are characterized by their sluggish growth and ability to enlarge, primarily affecting the oral and maxillofacial tissues. Timely diagnosis and treatment are crucial to prevent potentially serious consequences. The present study aimed to evaluate and compare the immunohistochemical expression of cytokeratin 19 in the epithelium of odontogenic keratocyst, dentigerous, and radicular cysts.

Methods: This study analyzed forty-five formalin-fixed, paraffin-embedded tissue blocks containing odontogenic cysts. The sample consisted of fifteen odontogenic keratocysts, fifteen dentigerous cysts, and fifteen radicular cysts. Immunohistochemical analysis was performed to assess the expression of the cytokeratin 19 epithelial marker in these samples. Statistical analyses were conducted using Statistical Package for Social Sciences version 26, employing the Chi-square test for comparative analysis of cytokeratin 19 expression among the odontogenic keratocyst, dentigerous cyst, and radicular cyst.

Results: This study showed that 80% of basal layer tissue samples in the odontogenic keratocyst group had negative cytokeratin 19 biomarker scores. In contrast, 60% of dentigerous cyst tissue blocks and 53.3% of radicular cyst tissue blocks were +1. This difference was statistically significant (P = 0.034). In comparison, between groups, there was no significant difference (P = 0.103) in CK19 expression in the surface and spinous layers.

Conclusion: The level of epithelial differentiation is correlated with cytokeratin 19 expression. The cysts with well-differentiated epithelium (radicular cyst and dentigerous cyst) express cytokeratin 19, whereas those with less well-differentiated epithelium (odontogenic keratocyst) exhibit low positives. Thus, it serves as a diagnostic tool for distinguishing these three lesions.

Scopus Crossref
View Publication
Publication Date
Thu Mar 24 2022
Journal Name
Arab World English Journal
Collocation Networks of Selected Words in Academic Writing: A Corpus-Based Study
...Show More Authors

This study aims at shedding light on the linguistic significance of collocation networks in the academic writing context. Following Firth’s principle “You shall know a word by the company it keeps.” The study intends to examine three selected nodes (i.e. research, study, and paper) shared collocations in an academic context. This is achieved by using the corpus linguistic tool; GraphColl in #LancsBox software version 5 which was announced in June 2020 in analyzing selected nodes. The study focuses on academic writing of two corpora which were designed and collected especially to serve the purpose of the study. The corpora consist of a collection of abstracts extracted from two different academic journals that publish for writ

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
The stylistics of expressive structure in Al-Sayyab's attempt- A textual study
...Show More Authors

Our research tends to study the poetic attempt of  Badr Shakir Al-Sayyab and examine it stylistically, and we suggested his mature collection '' Rain song'' as a pattern for our textual analysis of the poet's attempt.

   In the beginning , we confirm that branches of applied structures meet to produce poetry such as narration , drama , cinema , mythology , allegory , various religious and historical texts , previous events , and special cumentary events related to work production. If all above-mentioned was complicated and disregarded throughout a single text , the text writer would not secure positive results that might keep open continuity between him and his readers.

   Therefore , this issue w

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Scientific Review Engineering And Environmental Studies (srees)
Testing the performance of a solar energy cooling system in Baghdad city
...Show More Authors

Renewable energy resources have become a promissory alternative to overcome the problems related to atmospheric pollution and limited sources of fossil fuel energy. The technologies in the field of renewable energy are used also to improve the ventilation and cooling in buildings by using the solar chimney and heat exchanger. This study addresses the design, construction and testing of a cooling system by using the above two techniques. The aim was to study the effects of weather conditions on the efficiency of this system which was installed in Baghdad for April and May 2020. The common weather in these months is hot in Baghdad. The test room of the design which has a size of 1 m3 was situated to face the geographical south. The te

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Solar Energy
A review of studies on using nanofluids in flat-plate solar collectors
...Show More Authors

Continuous escalation of the cost of generating energy is preceded by the fact of scary depletion of the energy reserve of the fossil fuels and pollution of the environment as developed and developing countries burn these fuels. To meet the challenge of the impending energy crisis, renewable energy has been growing rapidly in the last decade. Among the renewable energy sources, solar energy is the most extensively available energy, has the least effect on the environment, and is very efficient in terms of energy conversion. Thus, solar energy has become one of the preferred sources of renewable energy. Flat-plate solar collectors are one of the extensively-used and well-known types of solar collectors. However, the effectiveness of the coll

... Show More
Scopus (135)
Crossref (127)
Scopus Clarivate Crossref
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (16)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Thu Jan 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Graphic Novels : A Privilege For Teachers and Students
...Show More Authors

There are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called grap

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref