Background: Although expression of the HER-
2/neuoncogene may be of some prognostic importance
in advanced ovarian cancer, its role in early-stage
disease has not been established. The current study
examined the prevalence and significance of HER-
2/neu expression in different grades of different types
of surface epithelial ovarian carcinoma.
Methods: Thirty eight female patients with surface
epithelial ovarian cancer were included in this study.
The blocks of corresponding formalin fixed, paraffinembedded
ovarian biopsies were retrieved from the
archives and hematoxylin-eosin slides of each ovarian
biopsy were reviewed and marked their grades of
differentiation , then a new sections from each sample
stained by her2/neu as immunohistochemical
technique and classified according to degree of
intensity regarding to dependable scoring system ,
also ten cases taken as control group from normal
ovarian tissue.
Results :-Thirty eight sample of surface ovarian
carcinoma were collected , twenty six were serous
ovarian carcinoma , eleven cases were mucinous
carcinoma type and one case was endometriod
carcinoma . The samples were classified according to
their histological types and according to their grading .
The mean age of SC type was 54.52 with SD 7.17
while the mean age of mucinous carcinoma was 49.36
with SD 4.9. There is no significant relation between
each type and grading system ( P Value = 0.9 ) ,also
there is no significant relation between age group
distribution and types of ovarian carcinoma ( P value
= 0.14 ).Instate that statically no significant relation
between intensity of expression Her2/neu and high
grading of each types of collected sample ( P value
=0.22) and this may be due to small sample size but
still there are obvious criteria showing that her2/neu
expression relatively increase in higher grade of each
types of studied ovarian surface epithelial carcinoma.
Conclusion :-In conclusion, the overexpression of
the HER-2/neu gene product appears to be an unusual
occurrence in early epithelial ovarian cancer and may
occur less frequently than in advanced disease. Early
ovarian cancer will eventually progress to advanced
disease if undiagnosed and untreated, then, HER-
2/neu overexpression does not appear to be a general
early event in the development of ovarian cancer.
Instead, it seems that increased expression develops in
many instances after the malignant phenotype has
already arisen.
The present paper is very important for study of biodiversity of Iraq , to know how the
changes going and how the laughing dove S. senegalensis was a rare species in Iraq and now
is common and also the (baz) gosh hawk A. gentilis is common and the most famous 6rd of
pray in Iraq, till now missing from ornithologist and bird watcher to record it
Urban land price is the primary indicator of land development in urban areas. Land prices in holly cities have rapidly increased due to tourism and religious activities. Public agencies are usually facing challenges in managing land prices in religious areas. Therefore, they require developed models or tools to understand land prices within religious cities. Predicting land prices can efficiently retain future management and develop urban lands within religious cities. This study proposed a new methodology to predict urban land prices within holy cities. The methodology is based on two models, Linear Regression (LR) and Support Vector Regression (SVR), and nine variables (land price, land area,
... Show MoreThe most significant water supply, which is the basis of agriculture, industry and human and wildlife needs, is the river. In order to determine its suitability for drinking purposes, this study aims to measure the Water Quality Index (WQI) of the Tigris River in the Salah Al-Din Province (center of Tikrit), north of Baghdad. For ten (9) physio-chemical parameters, namely turbidity, total suspended sediments, PH, electrical conductivity, total dissolved solids, alkalinity, chloride, nitrogen as nitrate, sulphate, and then transported for examination to the laboratory, water samples were collected from 13 locations along the Tigris river. Using the weighted arithmetic index method, the WQI was measured and found to be 105,87 in up-stream, wh
... Show MoreThe research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative model for the quadratic programming models.
The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's performance .
Variation in the numbers of pectoral fin spines and rays, pelvic fin rays, gill rakers on the first gill arch, anal fin rays, and the number of vertebrae of Silurus triostegus Heckel were examined in specimens from 16 localities that span its entire distribution range in the Tigris, Euphrates, and Shatt al-Arab rivers in Iraq. The mean number of the six meristic traits increases toward high latitudes with maximum and minimum values in the north and south of Iraq. Based on cluster analysis and PCA, the Mesopotamian river samples were clearly separated into three distinct groups. The upper Tigris populations were isolated from those of the middle and southern populations of this river and from those of
It is the grace of God and his grace that he accepts repentance for his slaves, forgives their bad deeds in return for their misfortune, or offers them a good deed, but pardons many of them for free. Therefore, it is not long for God Almighty to forgive His mercy for many of His slaves and bring them to Paradise with no punishment or punishment, even if they have committed some sins, because of the multitude of their favorable navigational disadvantages, or even without gratitude thanks to him and him. With all this, some have overlooked the old and new on these things and amazed at the hadeeth ((God may have seen the people of the full moon and said do what you want, I have forgiven you)). Therefore, the scholars tried to answer some of
... Show MoreThis study uses load factor and loss factor to determine the power losses of the electrical feeders. An approach is presented to calculate the power losses in the distribution system. The feeder’s technical data and daily operation recorded data are used to calculate and analyze power losses.
This paper presents more realistic method for calculating the power losses based on load and loss factors instead of the traditional methods of calculating the power losses that uses the RMS value of the load current which not consider the load varying with respect to the time. Eight 11kV feeders are taken as a case study for our work to calculate load factor, loss factor and power losses. Four of them (F40, F42, F43 and F
... Show MoreThree-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More