BACKGROUND: The rapidly growing knowledge regarding factors controlling tumour growth, with the new modalities of therapy acting on the biological activity of the tumours draw the attention of most cancer researches nowadays and represent a major focus for clinical oncology practice. For the detection of HER2/neu protein overexpression and gene amplification, immunohistochemistry (IHC) and in-situ hybridisation (ISH) is the recommended techniques, respectively, with high concordance between the two techniques. The current United Kingdom recommendations for HER2/neu testing are either for a two-tier system using IHC with reflex ISH testing in equivocal positive cases, or a one-tier ISH strategy. AIM: To compare the results of HER2/neu gene status in patients with breast carcinoma obtained by chromogenic in situ hybridisation with those obtained by immunohistochemistry, and to compare these results with hormonal receptors expression by immunohistochemistry and with age of patients.METHODS: Immunohistochemistry technique was used for evaluation of status of estrogen receptors (ER) and progesterone receptors (PR) and HER2/neu protein expression in 448 Iraqi patients with invasive breast carcinoma with different grades and histological types and then chromogenic in situ hybridization (CISH) technique was applied for all scores of HER2/neu to detect the gene status and compare the results in all negative, equivocal and positive cases by immunohistochemistry (IHC). The cases were referred from different centres, and IHC and CISH techniques were done in central public health laboratory in Baghdad over 28 months, from July 2013 to November 2015. A comparison of the results was made to find the relationship between HER2/neu and hormone receptors status and other clinical parameters like patients age. RESULTS: The mean age of the study cases was 49.08 years, ranging from 24 to 83 years. Of the 448 cases of breast carcinoma, 44 (9.8%) cases were of score 0 by IHC, none of them (0%) showed HER2/neu gene amplification by CISH. 71(15.8%) cases were of score 1 by IHC, 15 (21.12%) of them showed HER2/neu gene amplification by CISH, all were of low amplification. There were 306 (68.3%) cases of score 2 by IHC, of which 102 (33.33%) cases showed HER2/neu gene amplification by CISH, with 79 (25.81%) of them with low amplification and 23 (7.51%) cases with high amplification, while only one case (0.32%) remained in equivocal category. In score 3, all the 27 (6.0%) cases showed gene amplification with 12 (44.44%) cases with low amplification and 15 (55.55) cases with high amplification with overall percentage of gene amplification in score 3 of 100%. There was a significant inverse relationship between hormone receptors (ER and PR) status and HER2/neu gene amplification. No significant relationship was found between the patient’s age and HER2/neu gene amplification.CONCLUSION: Although immunohistochemistry is a widely used, less expensive and reliable test, we strongly advice performance of chromogenic in situ hybridization in assessment of HER2/neu gene status in all cases diagnosed with breast carcinoma as significant number of cases that were reported as negative by immunohistochemistry showed positive amplification by chromogenic in situ hybridization and can get benefit from anti-HER2 targeted treatments.
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreA number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col
... Show MoreIn this work, results from an optical technique (laser speckle technique) for measuring surface roughness was done by using statistical properties of speckle pattern from the point of view of computer image texture analysis. Four calibration relationships were used to cover wide range of measurement with the same laser speckle technique. The first one is based on intensity contrast of the speckle, the second is based on analysis of speckle binary image, the third is on size of speckle pattern spot, and the latest one is based on characterization of the energy feature of the gray level co-occurrence matrices for the speckle pattern. By these calibration relationships surface roughness of an object surface can be evaluated within the
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreThe using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible models of parametric models and these models were nonparametric models.
In this manuscript were compared to the so-called Nadaraya-Watson estimator in two cases (use of fixed bandwidth and variable) through simulation with different models and samples sizes. Through simulation experiments and the results showed that for the first and second models preferred NW with fixed bandwidth fo
... Show MoreA fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show MoreBACKGROUND: The degree of the development of coronary collaterals is long considered an alternate–that is, a collateral–source of blood supply to an area of the myocardium threatened with vascular ischemia or insufficiency. Hence, the coronary collaterals are beneficial but can also promote harmful (adverse) effects. For instance, the coronary steal effect during the myocardial hyperemia phase and that of restenosis following coronary angioplasty.