Preferred Language
Articles
/
dRejP48BVTCNdQwCs2Z7
Prognostic Value of Intracellular Transcription of Factors HIF-1α and p53 and Their Relation to Estradiol and TNM Parameters of Breast Cancer Tissues in Women with Invasive Ductal Carcinoma in Thi-Qar Province, Iraq
...Show More Authors

Breast cancer is the most common malignancy affecting women's health, with an increasing incidence worldwide. This study aimed to measure the intracellular concentration of the hypoxia-inducible factor 1 α (HIF-1α), tumor suppression protein p53, and estradiol (E2) in tumor tissues of adult females with breast cancer and their relation to tumor grade, tumor size, and lymph node metastases (LNM). The study was conducted on 65 adult female participants with breast mass admitted to the operating theater in Al-Hussein Teaching Hospital and Al-Habboby Teaching Hospital in Nasiriyah, Iraq, from January to November 2021. Fresh breast tumor tissues were collated and homogenized for intracellular biochemical analysis using the enzyme-linked immunosorbent assay method. In total, 44 (58%) out of 65 patients, in the age range of 18-42 years and the mean±SD age of 32.55±6.40 years, had fibroadenomas, and other 21 (42%) cases, in the age range of 32-80 years and the mean±SD age of 56±14.4 years had invasive ductal carcinoma (IDC) breast cancer. Intracellular levels of HIF-1α, p53, and E2 were elevated significantly (P<0.001) in IDC cases compared to the benign group. The most malignant tumors of IDC cases were in grade III and sizes T2 and T3. The tissue concentrations of HIF-1α, P53, and E2 were significantly elevated in patients with tumor stage T3 compared to T2 and T1. A significant elevation was found in the levels of HIF-1α, p53, and E2 in the positive LNM subgroup compared to the negative LNM group. Based on the obtained results, the prognostic value of the intracellular HIF-1α is considered to be a useful prognostic factor in Iraqi women with ICD and the combination of a HIF-1α protein with the nonfunctional p53 and E2 tends to indicate the proliferation, invasiveness, and metastases of the breast tumors.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
Sports Culture
The impact of skill exercises incorporated into the combined training method in the development of special physical abilities and Endurance performance tolerance for futsal players
...Show More Authors

Abstract Physical requirements are an important priority for the development of football gymnastics coaches because the nature of performance is interconnected and interconnected in terms of the player's duties in the match. In the gameplay situations, the player must perform the skill with strength and speed coupled with accuracy and the reactions of the colleague and competitor alike, which represents the normal reality of the football gymnasium Skilled exercises are one of the most suitable technical side exercises as they are built according to the components of the skill requirements of the game and the nature of its performance, which appear on the gro

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
Studying the x- ray atomic Scattering form Factor and Nuclear Magnetic Shielding Constant for Be atom in its Excited state (1s2 2s 3s) and the Be - like ions
...Show More Authors

The division partitioning technique has been used to analyze the four electron systems into six-pairs electronic wave functions for ( for the Beryllium atom in its excited state (1s2 2s 3s ) and like ions ( B+1 ,C+2 ) using Hartree-Fock wave functions . The aim of this work is to study atomic scattering form factor f(s) for and nuclear magnetic shielding constant. The results are obtained numerically by using the computer software (Mathcad).

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study to the Effect of Natural Particles Added to Unsaturated Polyester Resin of a Polymer Matrix Composite
...Show More Authors

Experimental investigations had been done in this study to demonstrate the effect of natural particles used as a reinforcement material to unsaturated polyester resin. The tensile test and water absorption were investigated according to (ASTM D638) and (ASTM D570), respectively. The influence of sunflower husk and pomegranate husk particles, used as a reinforcement material, on the tensile strength, Young's modulus and water absorption with different weight fraction (3%, 7% and 10%) and particle grain size (50µm, 100 µm and 150 µm), has been investigated. The water absorption of polymer composites was studied by measuring the specimen weight before and after immersion in water for one hundred days. In the experiments of tensile test,

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Government Controlling Standards GAO to limit Some of Negative Phenomena According to the Anti-corruption
...Show More Authors

Abstract :

       The research aims to diagnose some of the negative phenomena
 ( Counterfiting , Pettifogging , Embezzlement ) that have been detected over the past ( 2010 – 2014 ), a fixed-term part of the national strategy for the fight against corruption launched by the Joint Council for the fight against corruption in Iraq and measuring the application of government control according to the American standard GAO standards and identifying the potential for the application of those standards gap. It has been collecting data and information of special issues of corruption reports and meeting with (42) employees and the use of a checklist has been prepared for thi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 24 2025
Journal Name
Journal Of Physical Education
A comparative analysis , for some Elkinmetekih variables , in the performance of the skill (Nick shot the front reverse ) , between the players of the Iraqi team and the Egyptian , for young people in squash
...Show More Authors

View Publication
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Enhancement of self-healing to mechanical properties of concrete
...Show More Authors
Abstract<p>Concrete is the main construction material of many structures. Exposing to loads creates cracks in concrete, which reduce the performance and durability. The decrease of concrete cracks becomes a necessity demand to ensure more durability and structural integrity of the concrete structure. Autogenous healing concrete is a kind of new smart concretes, which has the ability to reclose its cracks by means of itself. Concrete self-healing is a type of free repairs processes, which is reduce direct and indirect cost of maintenance and repairing. This work targets to inspect the mechanical properties of concrete after using two combinations of two materials (20 kg/m3 calcium hydroxide Ca(OH</p> ... Show More
Crossref (1)
Clarivate Crossref
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Iraq's Position For Lebanese Civil War 1975-1976 in Iraqi and Arabian Newspapers
...Show More Authors

The research deals with Iraq's position of the Lebanese civil war and the Efforts made by Iraq in order to stop the bleeding of this war, the research also deals with the nature of regime in Lebanon and the developments that preceded the war and the positions of the internal and external competing forces, as weu as handling the Iraqi Syrian disagreement and it's impaet on the situation of Lebanon and the war developments.
The research focused on the Iraq's position towards the externd proposed solutions to solve the Lebanese civil war.

View Publication Preview PDF
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref