The main problem established by a discovery of a thyroid nodule is to discriminate between a benign and malignant lesion. Differential diagnosis between follicular thyroid cancer (FTC) and benign follicular thyroid adenoma (FTA) is a great challenge for even an experienced pathologist and requires special effort. A developing number of some encouraging IHC markers for the differential diagnosis of thyroid lesions have emerged, including, Hector Battifora mesothelial (HBME-1) and galectin-3 (Gal-3). There was significant positive correlation between Galectin-3 and HBME-1 in follicular carcinoma and follicular variant of papillary carcinoma (r= 0.380, P= 0.041) and (r= 0.315, P=0.047) respectively. There was no significant correlation between Galectin-3 and HBME-1 in follicular adenoma and follicular hyperplasia. Immunohistochemical expression of Galectin-3(Gal-3) there was highly significant difference (P<0.001) among study groups (FC, FVPC, FA, follicular hyperplasia) while there was no significant difference in mean of immunohistochemical score of Galectin-3 between follicular carcinoma, follicular variant of and papillary carcinoma (P>0.05); however, carcinoma of both types showed significantly higher Galectin-3 score than both follicular adenoma and follicular hyperplasia (P<0.001). In addition, the score of follicular adenoma was significantly greater than that of follicular hyperplasia (P<0.05). Immunohistochemical expression of HBME-1 immunohistochemical expression of HBME-1was highly significance among study groups (FC, FVPC, FA, follicular hyperplasia) while there was no significant difference in mean score between follicular carcinoma and follicular variant of papillary carcinoma (P>0.05); however, carcinoma of both types showed significantly higher HBME-1 score than both follicular adenoma and follicular hyperplasia (P<0.001). In addition, the score of follicular adenoma was significantly greater than that of follicular hyperplasia (P<0.05).Keywords: Galatin-3, HBME-1, Thyroid.
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreInteracting boson model version one has been used in the present
theoretical calculations. The energy levels & their transitions for dynamical symmetry 0(6), SU(3), U(5), ground-state band, Beta band, Gamma band, B(E2), Ot, B(Ml), ,u,gt and 6(£2/Ml)have been calculated to deduce the limit of Pt-198, Z=78. The present results confirmed the nuclear behavior of this isotope lay in the
transitional region 0(6), SU(3) U(5). The calculations of 021 + & 022+
showed that the shape of this isotope is oblate according to Q21+ and pr
... Show MoreDiabetic nephropathy (DN) is the most common microvascular complication that may lead to chronic renal failure in diabetic patients. Till now microalbuminuria, with its restrictions, is the early marker of DN, appeared after the disease exacerbation. Thus, new biomarkers are required to predict the early onset of DN before the appearance of microalbuminuria. The aim of this study is to investigate the possible use of uVDBP in the early prediction of DN. Fifty diabetic patients with DN and 40 diabetic patients without DN for both types of diabetes were enrolled in this study. All patients were tested for uACR, uVDBP (measured by ELISA), and blood HbA1c. The results demonstrated a highly significant elevation of uAC
... Show MoreThe mixed-spin ferrimagnetic Ising system consists of two-dimensional sublattices A and B with spin values and respectively .By used the mean-field approximation MFA of Ising model to find magnetism( ).In order to determined the best stabile magnetism , Gibbs free energy employ a variational method based on the Bogoliubov inequality .The ground-state (Phase diagram) structure of our system can easily be determined at , we find six phases with different spins values depend on the effect of a single-ion anisotropies .these lead to determined the second , first orders transition ,and the tricritical points as well as the compensation phenomenon .