Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Methods: Sixty three cases of pleural and peritoneal smears, previously reported as benign (19) cases, malignant (21) cases or atypical (23) cases, were retrieved from the files. In each of these smears; nuclear area, perimeter, and roundness coefficient of 80-100 cell were determined at x400 magnification by the use of image analysis system. Statistical analysis was performed using analysis of variance and Tukey's HSD test. Results: The mean values of nuclear roundness, nuclear perimeter and nuclear area vary between the three groups (benign, atypical and malignant cells) by using analysis of variance (p > 0.01). The value of nuclear roundness, perimeter and area did not differ significantly between benign and atypical cells (Tukey’s test: p<0.01). On the other hand, the value of nuclear roundness, perimeter and area showed a significant difference between malignant and atypical cells(Tukey's test: p> 0.01). Conclusion: In conclusion, our data suggest that cytomorphometry performed on effusion smear cells may provide important information for the differentiation of atypical cells from malignant cells, in which the values of atypical cells are closer to those of benign cells during the examination of pleural and peritoneal smears by the use of image analysis system
Back ground:Fine needle aspiration (FNA) is indicated in the exploration of superficial and deep masses. The accuracy of this procedure differs in various studies, and according to the organ explored. Palpable mammary masses of concern to the patient or clinician should be aspirated, regardless of imaging findings.
Objective: The present study aimed at evaluation of cytological results of FNA of different palpable breast lesions, using histopathological diagnosis as the gold standard for final diagnosis.
Patients & Methods: This prospective study includes 289 females with palpable breast lesions. FNA aspiration was conducted in a private out patient clinic during the period of 1994-2004. The cytolo
Background: The diagnosis of prostatic pathology may be of challenging , as some difficult and suspected, atypical cases may lack basal cell layer by routine H&E sections . Antibodies against 34BE12(HMW-CK) and p63 aid the diagnosis of such cases , to distinguish benign from malignant prostatic lesions.
Objective: to identify basal cells in atypical prostatic lesions ,and distinguish benign from malignant prostatic lesions.
Type of the study: A retro-spective study.
Methods: 115cases of paraffin embedded prostatic tissue blocks ,diagnosed as : 76 cases were benign prostatic hy
... Show MoreBioinformatics is one of the computer science and biology sub-subjects concerned with the processes applied to biological data, such as gathering, processing, storing, and analyzing it. Biological data (ribonucleic acid (RNA), deoxyribonucleic acid (DNA), and protein sequences) has many applications and uses in many fields (data security, data segmentation, feature extraction, etc.). DNA sequences are used in the cryptography field, using the properties of biomolecules as the carriers of the data. Messenger RNA (mRNA) is a single strand used to make proteins containing genetic information. The information recorded from DNA also carries messages from DNA to ribosomes in the cytosol. In this paper, a new encryption technique bas
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreSentiment analysis is one of the major fields in natural language processing whose main task is to extract sentiments, opinions, attitudes, and emotions from a subjective text. And for its importance in decision making and in people's trust with reviews on web sites, there are many academic researches to address sentiment analysis problems. Deep Learning (DL) is a powerful Machine Learning (ML) technique that has emerged with its ability of feature representation and differentiating data, leading to state-of-the-art prediction results. In recent years, DL has been widely used in sentiment analysis, however, there is scarce in its implementation in the Arabic language field. Most of the previous researches address other l
... Show MoreThis work highlights the estimation of the Al-Khoser River water case that disposes of its waste directly into the Tigris River within Mosul city. Furthermore, the work studies the effects of environmental and climate change and the impact of pollution resulting from waste thrown into the Al-Khoser River over the years. Al-Khoser River is located in the Northern Mesopotamia of Mosul city. This study aims to detect the polluted water area and the polluted surrounding area. Temporal remote sensing data of different Landsat generations were considered in this work, specifically Enhanced Thematic Mapper Plus of 2000 and Operational Land Imager of 2015. The study aims to measure the amount of pollution in the study area over 15 years
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MorePerimenopausal bleeding, is a very common problem, which is an alarming symptom for both; women and their doctors because of the rising fears of cellular changes or tumor of endometrium. In our study we tried to prove that collecting endometrial samples using the outpatient method of Pipelle is as effective as collecting the endometrial samples in the traditional method of Dilation and Curettage (DandC) in operation theatre which necessitates general anesthesia. Ninety four patients more than 40 years old were included in the study, all of them were complaining of abnormal uterine bleeding (pregnant ladies and ladies using hormonal contraception were excluded from the study) and endometrial samples were collected first in outpatient
... Show MoreBackground: Otitis media with effusion is characterized by accumulation of fluid in the middle ear in absence of acute inflammation and it is the most common cause of acquired hearing loss in children, and may negatively affect language development failure of medical treatment of middle ear effusion frequently require myringotomy and tympanostomy tube insertion.
Objectives: To determine tympanostomy tube complications of tube in children with chronic otitis media with effusion who were treated with Shah Grommet tube insertion.
Methods: The Medical records of 162 ears of 87 children (52 male and 35 female) were reviewed respectively, the patients ages wer
... Show More