Breast cancer is the most common malignancy affecting women's health, with an increasing incidence worldwide. This study aimed to measure the intracellular concentration of the hypoxia-inducible factor 1 α (HIF-1α), tumor suppression protein p53, and estradiol (E2) in tumor tissues of adult females with breast cancer and their relation to tumor grade, tumor size, and lymph node metastases (LNM). The study was conducted on 65 adult female participants with breast mass admitted to the operating theater in Al-Hussein Teaching Hospital and Al-Habboby Teaching Hospital in Nasiriyah, Iraq, from January to November 2021. Fresh breast tumor tissues were collated and homogenized for intracellular biochemical analysis using the enzyme-linked immunosorbent assay method. In total, 44 (58%) out of 65 patients, in the age range of 18-42 years and the mean±SD age of 32.55±6.40 years, had fibroadenomas, and other 21 (42%) cases, in the age range of 32-80 years and the mean±SD age of 56±14.4 years had invasive ductal carcinoma (IDC) breast cancer. Intracellular levels of HIF-1α, p53, and E2 were elevated significantly (P<0.001) in IDC cases compared to the benign group. The most malignant tumors of IDC cases were in grade III and sizes T2 and T3. The tissue concentrations of HIF-1α, P53, and E2 were significantly elevated in patients with tumor stage T3 compared to T2 and T1. A significant elevation was found in the levels of HIF-1α, p53, and E2 in the positive LNM subgroup compared to the negative LNM group. Based on the obtained results, the prognostic value of the intracellular HIF-1α is considered to be a useful prognostic factor in Iraqi women with ICD and the combination of a HIF-1α protein with the nonfunctional p53 and E2 tends to indicate the proliferation, invasiveness, and metastases of the breast tumors.
Modeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in
... Show MoreNowhere is American author Shirley Jackson’s (1916-1965) social and political criticism is so intense than it is in her seminal fictional masterpiece “The Lottery”. Jackson severely denounces injustice through her emphasis on a bizarre social custom in a small American town, in which the winner of the lottery, untraditionally, receives a fatal prize. The readers are left puzzled at the end of the story as Tessie Hutchinson, the unfortunate female winner, is stoned to death by the members of her community, and even by her family. This study aims at investigating the author’s social and political implications that lie behind the story, taking into account the historical era in which the story was published (the aftermath of th
... Show MoreHeart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreIn a quick reading of the character of Camille Ben Ziad al-Nekha al-Kufi al-Taabi, one of the most sincere companions of Imam Ali (peace be upon him), he enjoyed great status and status because he was one of the people of his people who lived alongside Imam Ali (peace be upon him) since his tribe migrated from Yemen to Kufa To this end, he became loyal during the reign of Imam Ali (peace be upon him), who is also a member of the delegation coming from Kufa to protest against the actions of the Wali of Kufa during the reign of Caliph Uthman ibn Affan. After the death of Caliph Uthman bin Affan, (Peace and blessings of Allaah be upon him) (Duaa kamil), one of the most famous and important supplications in Islamic history, and each one of u
... Show MoreOur dear country faces many and varied challenges aimed at its history, civilization, its people, the scourge of drugs and psychotropic substances and their misuse. Therefore, we have a historical, ethical and professional responsibility to coordinate efforts and cooperation between all concerned to protect the Iraqi society from the threat of this scourge. Creative sources have varied in the variety of expressive means in politics, literature and the arts, in their style and technical treatment of various topics with innovative manifestations and intuitive interactive with visions as well as influences Psychological expressive descriptions of visual scene, it is one of the media and propaganda that contribute to the raising and developm
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreMethotrxate (MTX) has become the standard of care and first-line therapy for patients who have RA and consider as a gold standard of treatment for RA. The role of MTX in the treatment of RA has now been well established. The use of MTX treatment of RA inhibits proliferation of the lymphocytes, reduces signs and symptoms this disease, reduces progression damage of the joints and improves quality of life outcome. Progranulin (PGRN) acts a role in autoimmune inflammatory, has important function in several processes including immune response. Present study has conducted to find the effect of MTX drugs as a therapeutic target for RA patients because of its ability to bind with tumor necrosis factor receptor (TNFR), with progranulin, obestatin an
... Show MoreBackground: Asthma is a disease of the airways characterized by chronic inflammation associated with airway hyper-responsiveness and airway wall remodeling. Aims of the study: The aims of this study was to determine the prevalence of oral manifestations , identify different microorganism from oral micro flora and determination of salivary IgA and salivary flow rate in asthmatic patients taking different dose of Prednisolone in comparison with control group. Subjects, materials and methods: The study included 17 patients under treatment with Prednisolone (10-20 mg),15 patients take (20-30 mg) of Prednisolone and other 18 patients take (30 – 40mg) of Prednisolone, and 25 healthy control group (10 male and 15 female). Results : The mo
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More