Background: Oral squamous cell carcinoma is the most prevalent malignant neoplasm of the oral cavity which results from accumulated genetic and epigenetic alterations. It is not always inexorable and may be reversible if early intervention in the process can occur to prevent further genetic mutation and disease progression. The FHIT gene is a tumor suppressor gene located in FRA3B region which is the most active common fragile site, where DNA damage leading to aberrant transcripts and translocations frequently occur. The WWOX is a tumor suppressor gene that plays a central role in tumor suppression through transcriptional repression and apoptosis, with its apoptotic function the more prominent of the two. This study aimed to evaluate and compare the immunohistochemical expression of FHIT and WWOX in normal oral mucosa, oral epithelial dysplasia and oral squamous cell carcinoma and to correlate the expression of the mentioned markers with the clinicopathological features and to show the expression of studied markers with each other. Materials and methods: Fifty formalin-fixed, paraffin embedded tissue blocks (10 cases of normal oral mucosa, 19 cases of oral epithelial dysplasia, and 21 cases of oral squamous cell carcinoma) were included in this study. Immunohistochemical staining was performed using anti FHIT polyclonal antibody, and anti WWOX polyclonal antibody. Results: Positive IHC of FHIT was detected with high score in all cases of NOM, 16 cases (84%) of OED and 18 cases (86%) of OSCC. For WWOX expression positive IHC detected with high score in all cases (100%) of NOM, 14 cases (74%) of OED and 15 cases (71%) of OSCC. There was statistically highly significant correlation of both markers in OED and non significant correlation in OSCC, with significant differences among studied groups. Conclusions: These results signifying both markers cooperative tumor suppressive role and potential pathological transition from normal oral mucosa to dysplastic epithelium and subsequently cause malignant oral lesions.
Uncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that functions as an act over S if and only if functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following, is acting over S if and only if is a module where T is a nilpotent operator, is a
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreThis article aims to estimate the partially linear model by using two methods, which are the Wavelet and Kernel Smoothers. Simulation experiments are used to study the small sample behavior depending on different functions, sample sizes, and variances. Results explained that the wavelet smoother is the best depending on the mean average squares error criterion for all cases that used.
Background. To identify the most common retention protocols practiced by Iraqi orthodontists using a specially designed e-survey. Furthermore, this study aimed to assess the effect of sociodemographic factors on the participant’s choice. Methods. Two hundred and twenty-five questionnaires with 23 multiple choice questions were sent to members of the Iraqi Orthodontic Society. The questionnaire was organized into four sections representing information about sociodemographic status of the orthodontists, factors affecting the selection of the retention system, commonly used retainers in the upper arch and lower arch, and duration of the retention system. The chi-square test was used to test the significant association between differe
... Show MoreThe dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s
... Show MoreIn these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso
... Show MoreThe objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.
A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.
Being unsatisfied with the job was as
This paper proposes a better solution for EEG-based brain language signals classification, it is using machine learning and optimization algorithms. This project aims to replace the brain signal classification for language processing tasks by achieving the higher accuracy and speed process. Features extraction is performed using a modified Discrete Wavelet Transform (DWT) in this study which increases the capability of capturing signal characteristics appropriately by decomposing EEG signals into significant frequency components. A Gray Wolf Optimization (GWO) algorithm method is applied to improve the results and select the optimal features which achieves more accurate results by selecting impactful features with maximum relevance
... Show More