Background:
Angiogenesis plays a crucial role in tumorigensis; several reports have described a significant increase in microvessel density (MVD) in colorectal carcinogenesis There are
several methods to measure the angiogenesis in neoplasms, but immunohitochemistry seems to be the mainstay of all. This method enable us to measure the tumor microvessel densities highlighted by using antibodies directed against endothelial cell markers like CD31,CD34 or others; then assessment of MVD by manual count of the number of microvessels in what appears to be the most vascular area of the tumor(called the hot spot) using a protocol described by Weidner et al.Automated cellular imaging system is used to analyze
immunohistochemically stained slides .studies have shown that the device offers accurate precision and reproducibility of immunostained slide analysis exceeding that possible with
manual evaluation which was the prevalent method.
Aims of the study:
To assess the angiogenesis in normal, adenomatous (benign) and malignant colorectal tissues using CD34 and the microvessels will be measured both manually by hot spot
method as the MVD and by the use of computerized image analysis system as fraction area ,we correlate between microvessels density and fraction area with various
clinicopathological parameters in colorectal cancer (CRC), and to a compare between the results which obtained from both methods.
Methods:
Paraffin embedded archival materials from 50 cases including three normal resection (non tumoruos) margins, 12 benign colonic lesions and 35 colonic adenocarcinoma were
used . 5mm section were cut and they were stained by anti CD34 antibody Angiogenesis was measured as MVD by two methods : manually by light microscope and by a computer
image analysis system (as fraction area). Then the MVD and fraction area were correlated with different clinicopathological parameters.
Results :
This study demonstrate that there is a statistical difference in MVD and fraction area in both hot spot method and CIAS respectively between benign and malignant tumors . P value
< 0.05 in hot spot method and less than 0.001 in CIAS and there was highly significant correlation between MVD and fraction area with the grade . There was significant increase
in MVD and fraction area from well differentiated to moderately differentiated and to poorly differentiated .There was no significant correlation between MVD and lymph node
involvement by hot spot method but CIAS proved a significant correlation between fraction area and lymph node involvement.Both methods (hot spot and CIAS) proved no
significant correlation with age , sex , size of the tumor , site of the tumor , stage of the tumor and the number of lymph node involverment.
Background: Klebsiella oxytoca is a Gram-negative rod-shaped bacterium that is becoming resistant to multiple drugs and is frequently endangering patients' lives. It is a member of the human microbiota.
Objectives: To assess the value of identifying K. oxytoca using an automated diagnostic system (VITEK-2) as compared to traditional manual methods.
Materials and Methods: A total of 136 clinical specimens were collected from patients in Baghdad hospitals during a period from July to November 2022. VITEK-2 system was used to recognize the isolated bacteria to the genus and species level. The biochemical indole test was used as a confirmatory test at
... Show MoreThis work explores the designing a system of an automated unmanned aerial vehicles (UAV( for objects detection, labelling, and localization using deep learning. This system takes pictures with a low-cost camera and uses a GPS unit to specify the positions. The data is sent to the base station via Wi-Fi connection.
The proposed system consists of four main parts. First, the drone, which was assembled and installed, while a Raspberry Pi4 was added and the flight path was controlled. Second, various programs that were installed and downloaded to define the parts of the drone and its preparation for flight. In addition, this part included programs for both Raspberry Pi4 and servo, along with protocols for communication, video transmi
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThis research deals with unusual approach for analyzing the Simple Linear Regression via Linear Programming by Two - phase method, which is known in Operations Research: “O.R.”. The estimation here is found by solving optimization problem when adding artificial variables: Ri. Another method to analyze the Simple Linear Regression is introduced in this research, where the conditional Median of (y) was taken under consideration by minimizing the Sum of Absolute Residuals instead of finding the conditional Mean of (y) which depends on minimizing the Sum of Squared Residuals, that is called: “Median Regression”. Also, an Iterative Reweighted Least Squared based on the Absolute Residuals as weights is performed here as another method to
... Show MoreNathaniel Hawthorne (1804-1864) has been widely known for his special interest in the female characters. In many of his novels, he narrates the conditions, values, and the institutions that surround and control the life of women, leading them to be victims. In “Rappaccini’s Daughter” (1844), the heroine, Beatrice is created to be victimized by her loved ones (her father and lover). This paper focuses on the term “victim,” it shows its aspects through the development of Beatrice’s character. The paper also studies a female character in the male-dominated society, to show the cruelty done to her, and how she is considered to be a second rate person, who is unable to live normally, or at least to save herself from dea
... Show MoreCompressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel
... Show MoreProvisions and controls on the disposal of public funds between Sharia and law
Research Summary
That money is the foundation of life and one of the most important reasons for the reconstruction of the land, and God is the owner
The real value of this money, God has borrowed some individuals on public money, and people
They are charged with preserving it, since it is beneficial to them all, without anyone taking it
To himself, and the guardian is charged by God to protect this money and aggression
Because of its power, authority, various organs and public servants of the province
Upon him; Because the assault on public money by employees and others in the organs of the state
And exploitation of their jobs and this
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreImage Fusion Using A Convolutional Neural Network