Epithelial and stromal communications are essential for normal uterine functions and their dysregulation contributes to the pathogenesis of many diseases including infertility, endometriosis, and cancer. Although many studies have highlighted the advantages of culturing cells in 3D compared to the conventional 2D culture system, one of the major limitations of these systems is the lack of incorporation of cells from non‐epithelial lineages. In an effort to develop a culture system incorporating both stromal and epithelial cells, 3D endometrial cancer spheroids are developed by co‐culturing endometrial stromal cells with cancerous epithelial cells. The spheroids developed by this method are phenotypically comparable to in vivo endometrial cancer tissue. Proteomic analysis of the co‐culture spheroids comparable to human endometrial tissue revealed 591 common proteins and canonical pathways that are closely related to endometrium biology. To determine the feasibility of using this model for drug screening, the efficacy of tamoxifen and everolimus is tested. In summary, a unique 3D model system of human endometrial cancer is developed that will serve as the foundation for the further development of 3D culture systems incorporating different cell types of the human uterus for deciphering the contributions of non‐epithelial cells present in cancer microenvironment.
Abstract The aim of this study is preparing an intellectual map according to the feedback (verbally and writhingly ) in order to learn some skills of floor exercises in the women's artistic gymnastics , In addition to that the aim of this study defines on the impacts of intellectual map according to the feedback approach, and to identify the best group between the three groups study in the learning of skills approach in this study, the researchers used the experimental method, the subject of the study included on students second class in physical education and sport sciences , Baghdad University (2014-2015) , and divided into three groups for teaching skills which was under studied .The species used the specific manner by lot for selection
... Show MoreBackground: The aim of this study is to evaluate the color change ∆E of the dental enamel following treatment with 2 kinds of protector (icon infiltrant, clinpro varnish) before fixed orthodontic treatment to avoid the possible white spot lesions. Materials and Methods: Fifty four subjects treated with fixed appliances were divided into 3 groups: the 1st group was control, while the 2nd and 3rd groups were treated with icon infiltrant and clinpro varnish before bonding procedure, respectively. Color parameters (L,a,b) were recorded for the middle and gingival thirds before and after bonding procedure to get the ∆E of each group. Results: One-way ANOVA test showed a non-significant difference in ∆E between the 3 groups a
... Show MoreThe aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More
Research Summary
The doctrine of belief in the Last Day is one of the pillars of faith, and the doctrine of resurrection and reckoning are part of this day.
Belief in the Last Day puts a person in constant control over himself, as this control creates in this person happiness and a decent life, and he renounces the world and turns away from all vices and adorns all virtues.
On the other hand, we find that the person who does not believe in this day does not stand before his eyes anything that prevents him from doing injustices and corruption in the land. The doctrine of belief in the Last Day alone is
... Show More