Background: Odontogenic cysts include a group of osseodestructive lesions that frequently affect the jaws. Those cysts could derive from odontogenic epithelium and occur in the tooth-bearing regions of the jaws. The aims of this study were to evaluate the immunohistochemical expression of Cyclin D1 in Keratocystic Odontogenic Tumor, Dentigerous cyst and Radicular cyst in epithelium and connective tissue capsule. Materials and Methods: In this study, thirty formalin fixed paraffin embedded tissue blocks of Odontogenic cysts and Tumor, consist of 14 Keratocystic Odontogenic Tumor, 8 dentigerous cysts and 8 radicular cysts were analyzed immunohistochemically for the presence of Cyclin D1 proteins. Results: Strong to moderate expression of Cyclin D1 in epithelium was found in Keratocystic Odontogenic Tumor cases with positive cases percentage was (85.7%). Statistical significant differences (P<0.001) observed when comparing the three lesions. Immunoreactivity of Cyclin D1 in stroma of Keratocystic Odontogenic Tumor was higher than in dentigerous cysts and radicular cysts cases. However, the difference was not statistically significant (P<0.067). Conclusion: The results of this study propose that high expression rate of Cyclin D1 might be one of the reasons for aggressive behavior of Keratocystic Odontogenic Tumor and high recurrence rate. Key Words: Keratocystic Odontogenic Tumor, dentigerous cysts, radicular cysts, Cyclin D1, immunohistochemistry.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
Is no longer a football player looks to sport as a means of entertainment and physical development. But become see as part of The economic and is getting in return for the effort of، Through a contract with a club to organize the activity which is called a contract of professional, This contract is similar to the rest of the contracts in terms of problems and dispute that arise during the implementation or after it ends because of the nature of sports to such disputes and privacy being subject to special rules (regulations, national and international professional) required that subject to judicial bodies private mission confined settle sports disputes these entities and is affiliated unions legal committees and the court of arbitration for
... Show MoreAddressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreThe aim of this study is to find a relationship between oxidative stress and adiponectin in Iraqi patients with acromegaly. The present study included 30 patients with acromegaly disease attending at Al-Yarmuk teaching hospital , and 30 healthy individuals as a control group.The two groups with ages ranging (30-55) years. The results revealed a highly significant elevation in all parameters (GH,IGF-1 , adiponectin , malondialdehyde , and peroxynitrite ) levels in sera of patients when compared with healthy control .It can be concluded that oxidative stress (malondialdehyde and peroxynitrite ) may be valuable in detecting of endocrine diseases like acromegaly .
The aim of this study is to find a relationship between oxidative stress and adiponectin in Iraqi patients with acromegaly. The present study included 30 patients with acromegaly disease attending at Al-Yarmuk teaching hospital , and 30 healthy individuals as a control group.The two groups with ages ranging (30-55) years. The results revealed a highly significant elevation in all parameters (GH,IGF-1 , adiponectin , malondialdehyde , and peroxynitrite ) levels in sera of patients when compared with healthy control .It can be concluded that oxidative stress (malondialdehyde and peroxynitrite ) may be valuable in detecting of endocrine diseases like acromegaly .
The health care industry is witnessing an increasing trend in the use of generic medicines because of their presumed low cost compared with innovator medicines. The aim of this study was to determine and compare the performance of the copy drug Osveral®and its innovator drug deferasirox (Exjade®).
A prospective observational study including 223 patients receiving the branded medicine Exjade®and 101 patients receiving the copy Osveral®was carried out. Data were assessed for a 1-year period and included clinical symptoms, serum ferrit
In this research, a mathematical model of tumor treatment by radiotherapy is studied and a new modification for the model is proposed as well as introducing the check for the suggested modification. Also the stability of the modified model is analyzed in the last section.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More