BACKGROUND: Carcinoma of urinary bladder is one of the most common malignancies worldwide and constitutes a major health problem. Multiple risk factors are associated with this tumor and its prognosis will depend on different clinicopathological parameters. Over expression of P53 protein and mutant Rb gene is associated with more aggressive clinical and histopathological features of the tumor such as advanced stage and higher grade. AIM: The immunohistochemical expression of Rb gene and P53 gene will be assessed through their protein products in transitional cell carcinoma (TCC) of the urinary bladder and then will be correlated with other well-known risk factors and prognostic parameters of bladder TCC, such as grading, tumor size, smoking, alcohol drinking, and family history. METHODS: Patients were recruited from the uro-surgical department/Surgical Subspecialties Teaching Hospital during the period from November 2020 through April 2021. In this study, patients enrolled were those suspected to have bladder carcinoma. The work up included a full history and clinical examination. Surgical samples were taken from the patients for histopathological evaluation; the study’s samples represented either endoscopic cup biopsy, transurethral resection of the tumor, or radical cystectomy. Sections obtained from these samples were stained with the conventional hematoxylin and eosin stain. Then, immunohistochemical staining for P53 and pRB was applied only for patients diagnosed with TCC. RESULTS: The differences between low-grade and high-grade tumors regarding pRb percentage score were statistically significant (p = 0.026), but were not significant regarding the intensity score (p = 0.094). There were significant correlations between tumor stage and both pRb intensity and percentage scores (p = 0.044 and 0.042, respectively). Differences between low-grade and high-grade tumors regarding p53 intensity score were significant (p = 0.022). The differences between low-grade and high-grade tumors regarding p53 percentage score were significant (p = 0.049). The differences between different tumor stages regarding p53 intensity score were significant (p = 0.018). The differences between different tumor stages regarding P53 percentage score were significant (p = 0.019). CONCLUSIONS: Tumor’s grade was found to be correlated with the tumor stage with no correlation with the age, gender, smoking, family history of TCC, history of urinary tract infection, bladder stones, nor the recurrence of the tumor. The pRb intensity and the percentage scores were correlated to each other and to tumor’s grade and stage, except for the pRb intensity which showed no correlation with the tumor’s grade. The P53 intensity and percentage scores were correlated to each other and also to tumor’s grade and stage, so that P53 is over-expressed in tumors with higher grade and stage.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreLet R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.
Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.
The global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut
... Show MoreLet R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .
The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreAn aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical
... Show More