Objective Using two complementary techniques of virus detection human papillomavirus (HPV)[capture of hybrids (CH) and polymerase chain reaction (PCR)], relate the cytological study and/or cervical biopsy with high-risk HPV (HPV-HR) genotypes presence, as well as relating their viral load (VL). Methods About 272 women, who presented most cell alterations compatible with lesions cervical HPV, which has been detected in all high risk by the CH method and HPV genotype detection by PCR. Results In 22% of the patients it was not detected HPV DNA. Genotype 16 and/or 18 was prevalent and was found in 33% of the 212 women studied, meanwhile, mixed infections were found by several genotypes in 25%. In as for the histological lesions found, in 61 patients with squamous intraepithelial lesions of high grade (H-SIL) and cancer, 55.73% presented genotypes 16 and/or 18, while in 38 patients with presence of altered squamous cells of significance uncertain (ASCUS) and 126 with squamous lesions low-grade intraepithelial (L-SIL), were put on manifest these genotypes only in 7.9% and 22.2%, respectively (p< 0.05). About 12.13% of the 272 patients had a VL< 3 pg/ml. In those with an HPV VL> 3 pg/ml, were HPV-AR found in 77.40% of these (p< 0.05). Conclusions In patients with H-SIL biopsy revealed genotypes 16 and/or 18. The CH2 technique is useful as a screening procedure, while PCR is interesting to identify HPV-HR genotypes
STAG3 is the meiotic component of cohesin and a member of the Cancer Testis Antigen (CTA) family. This gene has been found to be overexpressed in many types of cancer, and recently, its variants have been implicated in other disorders and many human diseases. Therefore, this study aimed to analyze the major variants of STAG3. Western blot (WB) and immunoprecipitation (IP) assays were performed using two different anti-STAG3 antibodies that targeted the relevant protein in MCF-7, T-47D, MDA-MB-468, and MDA-MB-231 breast cancer cells with Jurkat and MCF-10A cells as positive and negative controls, respectively. In silico analyses were searched to study the major isoforms. WB and IP assays revealed two abundant polypeptides < 191 kDa and
... Show MoreHuman Resources Management Practices (HRMP) and managerial control represent two academic fields that have been and still are the focus of many studies. However, merging both fields and studying the relationship that connects them and also the role that HRMP play in achieving the requirements of managerial control represents a new and novel study according to the available literature in these fields.
To achieve these goals, this study has been conducted, using the surveying questionnaire method, on a sample of ten general inspector offices in Iraq that work in the field of control for ministries and independent committees. A questionnaire has been used to collect the data which was analyzed with several s
... Show MoreThis research shows the importance of Baghdad in the field of urban heritage and was demonstrated in the Ibn al-Fiqh al-Hamdani's book Baghdad the City of Peace in which he focused on many urban aspects and reviewing its historical importance by connecting them with modern events and the role they play in cultural and civilized construction which included: mosques, schools and markets etc. and the service providing institutions and other pillars of the Islamic cities through showing the development back then and its importance as an integral part of the urban and cultural heritage of the Islamic cities in general and Baghdad city in particular.
In his book Baghdad the City of Peace, Ibn al-Faqih Hamadhaani
... Show MoreAbstract
The current research aims to develop a guidance program suitable for high school students and apply it to them in order to ensure the reduction of addiction to the use of different means of communication. The researchers used the scale of addiction to the means of communication (SAS) to measure the level of addiction as well as to identify the impact of the proposed guidance program in reducing the degree of addiction to communication. It was applied to a sample of (20) female students divided equally into two groups: an experimental group of (10) female students and a control group of (10) female students from the secondary level in a school under the department of education in the education of the alma
... Show MoreMaking the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.
The seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.
Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.
The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreVoice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto
... Show MoreA new approach presented in this study to determine the optimal edge detection threshold value. This approach is base on extracting small homogenous blocks from unequal mean targets. Then, from these blocks we generate small image with known edges (edges represent the lines between the contacted blocks). So, these simulated edges can be assumed as true edges .The true simulated edges, compared with the detected edges in the small generated image is done by using different thresholding values. The comparison based on computing mean square errors between the simulated edge image and the produced edge image from edge detector methods. The mean square error computed for the total edge image (Er), for edge regio
... Show More