Background: - Carcinoma of the lung has became the most common type of cancer since 1985 & the most common cause of cancer death in both males & females.
Aim of study: - To assess the diagnostic accuracy of bronchial wash cytology & application of immunocytochemical methods, using two tumor markers (low molecular weight cytokeratin & epithelial membrane antigen) for more accurate & precise diagnosis of lung tumors.
Patients, materials and methods: - Fifty fifes suspected lung cancer cases according to their clinicoradiological examinations were included in this study.
Bronchial wash cytology was performed for all the 55 patients. Smears were stained by conventional cytological stain in addition to immunocytochemial staining using low molecular weight cytokeratin & epithelial membrane antigen. The final results of bronchial wash were compared to histopathological results & final clinical diagnosis as.
Results: - Cytological smears of bronchial wash revealed the presence of malignant cells in 33 cases (60%). The sensitivity of bronchial wash cytology was 82.5%; the specificity was 100.0%, with overall accuracy of 87.3%. Using cytokeratin staining, 26 cases (47%) were positive for malignant cells, & 29 were negative. The sensitivity, specificity & overall accuracy were 65%, 100%, & 74.5% respectively. With EMA staining, 19 cases (27%) were positive for malignant cells & 36 were negative. The sensitivity, specificity & overall accuracy were 47.5%, 100%, & 61.8% respectively. Combined use of CK & EMA raised the sensitivity to 72.5%, specificity of 100% & overall accuracy of 80%. Combined use of monoclonal antibodies & conventional cytology raised the sensitivity to 95%, specificity 100%, with overall accuracy of 96.3%.
Conclusions: - Using more than one monoclonal antibody, or using combined conventional cytology & immunocytochemistry increase the sensitivity for detection of malignant cells in bronchial wash smears.
In this work, polynomials and the finite q-exponential operator are constructed. The operator is used to combine an operator proof of the generating function with its extension, Mehler's formula with its extension and Roger's formula for the polynomials . The generating function with its extension, Mehler's formula with its extension and Rogers formula for Al-Salam-Carlitz polynomials are deduced by giving special values to polynomials .
Atenolol was used with ammonium molybdate to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between atenolol and ammonium molybdate in an aqueous medium to obtain a dark brown precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.1-3.5 mmol/L for cell A and 0.3-3.5 mmol/L for cell B, and LOD 133.1680 ng/100 µL and 532.6720 ng/100 µL for cell A and cell B respectively with correlation coefficient (r) 0.9910 for cell A and 0.9901 for cell B, RSD% was lower than 1%, (n=8) for the determination of ate
... Show MoreThe paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.
The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer
... Show MoreThe trading banks in Iraq invest their funds according to regulations imposed by the Central Bank in Iraq in different financial fields like stock exchanges, acquire stocks as assets that could be sold at any time as well as make loans and contributing in corporations establishment also magnitude foreign capital through direct contacts with foreign exchange markets.
We can summarize the problem of this paper as shortage in mathematical models that used in studying and analyzing these investments and according to this problem we used (a constructed mathematical model ) consists of three major indicators: profitability of total investment assets which is divided into three sub-indicators: owners equity risk indicator, debits risk i
... Show MoreIn this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.
The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreThe main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More