Background: Oral squamous cell carcinoma is the most prevalent malignant neoplasm of the oral cavity which results from accumulated genetic and epigenetic alterations. It is not always inexorable and may be reversible if early intervention in the process can occur to prevent further genetic mutation and disease progression. The FHIT gene is a tumor suppressor gene located in FRA3B region which is the most active common fragile site, where DNA damage leading to aberrant transcripts and translocations frequently occur. The WWOX is a tumor suppressor gene that plays a central role in tumor suppression through transcriptional repression and apoptosis, with its apoptotic function the more prominent of the two. This study aimed to evaluate and compare the immunohistochemical expression of FHIT and WWOX in normal oral mucosa, oral epithelial dysplasia and oral squamous cell carcinoma and to correlate the expression of the mentioned markers with the clinicopathological features and to show the expression of studied markers with each other. Materials and methods: Fifty formalin-fixed, paraffin embedded tissue blocks (10 cases of normal oral mucosa, 19 cases of oral epithelial dysplasia, and 21 cases of oral squamous cell carcinoma) were included in this study. Immunohistochemical staining was performed using anti FHIT polyclonal antibody, and anti WWOX polyclonal antibody. Results: Positive IHC of FHIT was detected with high score in all cases of NOM, 16 cases (84%) of OED and 18 cases (86%) of OSCC. For WWOX expression positive IHC detected with high score in all cases (100%) of NOM, 14 cases (74%) of OED and 15 cases (71%) of OSCC. There was statistically highly significant correlation of both markers in OED and non significant correlation in OSCC, with significant differences among studied groups. Conclusions: These results signifying both markers cooperative tumor suppressive role and potential pathological transition from normal oral mucosa to dysplastic epithelium and subsequently cause malignant oral lesions.
The use of external posttensioning technique for strengthening reinforced concrete girders has been considerably studied by many researchers worldwide. However, no available data are seen regarding strengthening full-scale composite prestressed concrete girders with external posttensioned technique under static and repeated loading. In this research, four full-scale composite prestressed I-shape girders of 16 m span were fabricated and tested under static and repeated loading up to failure. Accordingly, two girders were externally strengthened with posttensioned strands, while the other two girders were left without strengthening. The experimental tests include deflection, cracking load, ultimate strength and strains at midspan, a
... Show MoreA series of new coumarin and N-amino-2-quinolone derivatives have been synthesized. The reaction of coumarin (1) with excess of Hydrazine hydrate 98% yielded 1-amino-2-quinolone (2), Compound (2) was reacted with different Sulfonyl chloride to yield Sulfonamides [ N-(2-oxoquinolin-1(2H)-yl) methane sulfonamide (3), N-(2-oxoquinolin-1(2H)-yl) Benzene sulfonamide (4) and 4-methyl-N-(2-oxoquinolin-1(2H)-yl) benzene sulfonamide (5) ], while reaction of 2-(4-methyl-2-oxo-2H-chromen-7-yloxy) acetic acid (8) with different amines yielded compounds [ 2-(4-methyl-2-oxo-2H-chromen-7-yloxy)-N-(2-oxoquinolin-1(2H)-yl) acetamide (9) and N-(5-methyl-1,3,4-thiadiazol-2-yl)-2-(4-methyl-2-oxo-2H-chromen-7-yloxy)acetamide (10) ] th
... Show MoreIn this study, experimental and numerical applied of heat distribution due to pulsed Nd: YAG laser surface melting. Experimental side was consists of laser parameters are, pulse duration1.3
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThrough the last decade, Integrated Project Delivery (IPD) methodology considers one of the new contractual relations that are also on the way to further integrate the process of combining design and instruction. On the other hand, Building Information Modeling (BIM) made significant advancements in coordinating the planning and construction processes. It is being used more often in conjunction with traditional delivery methods. In this paper, the researcher will present the achievement of IPD methodology by using BIM through applying on the design of the financial commission building in Mayssan Oil Company in Iraq. The building has not been constructed yet and it was designed by usin
Background: Excision repair cross-complementing group 2 gene (ERCC2) polymorphisms have been linked as being a risk factor for colorectal cancer (CRC) emergence. However, data from several studies are contradictory. To validate genetic biomarkers of the CRC; the impact of the following ERCC2 polymorphism (rs1799793 and rs238406) was examined on CRC susceptibility among sample of Iraqi population. Methods: A total of 126 subjects were enrolled in this case control study; 78 CRC patients and 48 apparently healthy individuals who are age, gender, smoking status and BMI matched. Polymerase chain reaction (PCR) was used for genotyping, followed by sequencing then the association between genetic polymorphisms and CRC risk was investigate
... Show MoreThe aim of the research is to identify the educational and psychological effects of the positive and negative aspects of using social networking websites. The researcher administered a number of questions to (250) users of different types of social networking websites. He analyzed his research results and obtained a number of results. The research has reached a number of recommendations and suggestion: Regulating the use of social media. Monitoring the parents of the sites used by children in a way that they do not feel they are observers. It is necessary to devote an hour daily to show the importance of real social life for children other than using social media. It is necessary to show the importance of choosing friends who hav
... Show More