Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Methods: Sixty three cases of pleural and peritoneal smears, previously reported as benign (19) cases, malignant (21) cases or atypical (23) cases, were retrieved from the files. In each of these smears; nuclear area, perimeter, and roundness coefficient of 80-100 cell were determined at x400 magnification by the use of image analysis system. Statistical analysis was performed using analysis of variance and Tukey's HSD test. Results: The mean values of nuclear roundness, nuclear perimeter and nuclear area vary between the three groups (benign, atypical and malignant cells) by using analysis of variance (p > 0.01). The value of nuclear roundness, perimeter and area did not differ significantly between benign and atypical cells (Tukey’s test: p<0.01). On the other hand, the value of nuclear roundness, perimeter and area showed a significant difference between malignant and atypical cells(Tukey's test: p> 0.01). Conclusion: In conclusion, our data suggest that cytomorphometry performed on effusion smear cells may provide important information for the differentiation of atypical cells from malignant cells, in which the values of atypical cells are closer to those of benign cells during the examination of pleural and peritoneal smears by the use of image analysis system
The current study was conducted on 504(Ros-308) broiler chicks reared in Animal farms belong to College of Agriculture, University of Baghdad during the period 28/9/2017- 9/11/2018 to determine the effect of ginseng additive on the performance of chicks. Results of study showed a significant effect (p≤0.05) of exposure period an Red blood cells, 3.56×106ml3 of blood was in bird, which exposure to 2hr at heat shock. In 42 day at age 106 ×38 ml3 of blood can noticed in the blood at birds, which exposure to 2hr in 21-42 days at 3 days of age. No significant effect at ginseng on blood cells. The results showed a significant effect (p≤0.05) of interaction on red blood cells at 21 and 42 days of age and the average cells between these ages
... Show MoreIn recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor
... Show MoreThe fuzzy assignment models (FAMs) have been explored by various literature to access classical values, which are more precise in our real-life accomplishment. The novelty of this paper contributed positively to a unique application of pentagonal fuzzy numbers for the evaluation of FAMs. The new method namely Pascal's triangle graded mean (PT-GM) has presented a new algorithm in accessing the critical path to solve the assignment problems (AP) based on the fuzzy objective function of minimising total cost. The results obtained have been compared to the existing methods such as, the centroid formula (CF) and centroid formula integration (CFI). It has been demonstrated that operational efficiency of this conducted method is exquisitely develo
... Show MoreEach organization struggles to exploit each possible opportunity for gaining success and continuing with its work carrier. In this field, organization success can be concluded by fulfilling end user requirements combined with optimizing available resources usage within a specified time and acceptable quality level to gain maximum profit. The project ranking process is governed by the multi-criteria environment, which is more difficult for the governmental organization because other organizations' main target is maximizing profit constrained with available resources. The governmental organization should consider human, social, economic and many more factors. This paper focused on building a multi-criteria optimizing proje
... Show MoreGenerally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, co
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The main aim of this research paper is investigating the effectiveness and validity of Meso-Scale Approach (MSA) as a modern technique for the modeling of plain concrete beams. Simply supported plain concrete beam was subjected to two-point loading to detect the response in flexural. Experimentally, a concrete mix was designed and prepared to produce three similar standard concrete prisms for flexural testing. The coarse aggregate used in this mix was crushed aggregate. Numerical Finite Element Analysis (FEA) was conducted on the same concrete beam using the meso-scale modeling. The numerical model was constructed to be a bi-phasic material consisting of cement mortar and coarse aggregate. The interface between the two c
... Show MoreCaryl Churchill's Top Girls (1982) reveals how women have achieved a point of strength and independence in their battle to face men's oppression throughout history. Churchill has replicated recent transitions in the 1980s and 1990s in works that depict these movements' central concerns and contradictions as they change. Similarly, her theater is a result of many problems and shifts in hegemonic modes of production during this time. This paper traces the achievements of the major character of Top Girls, Marlene, in her way of life and her handling of the struggles of other women around her. Because of this strength, Marlene is compared to the British Prime Minister, Thatcher. Therefore, this paper will shed light on the term of T
... Show More

