The main problem established by a discovery of a thyroid nodule is to discriminate between a benign and malignant lesion. Differential diagnosis between follicular thyroid cancer (FTC) and benign follicular thyroid adenoma (FTA) is a great challenge for even an experienced pathologist and requires special effort. A developing number of some encouraging IHC markers for the differential diagnosis of thyroid lesions have emerged, including, Hector Battifora mesothelial (HBME-1) and galectin-3 (Gal-3). There was significant positive correlation between Galectin-3 and HBME-1 in follicular carcinoma and follicular variant of papillary carcinoma (r= 0.380, P= 0.041) and (r= 0.315, P=0.047) respectively. There was no significant correlation between Galectin-3 and HBME-1 in follicular adenoma and follicular hyperplasia. Immunohistochemical expression of Galectin-3(Gal-3) there was highly significant difference (P<0.001) among study groups (FC, FVPC, FA, follicular hyperplasia) while there was no significant difference in mean of immunohistochemical score of Galectin-3 between follicular carcinoma, follicular variant of and papillary carcinoma (P>0.05); however, carcinoma of both types showed significantly higher Galectin-3 score than both follicular adenoma and follicular hyperplasia (P<0.001). In addition, the score of follicular adenoma was significantly greater than that of follicular hyperplasia (P<0.05). Immunohistochemical expression of HBME-1 immunohistochemical expression of HBME-1was highly significance among study groups (FC, FVPC, FA, follicular hyperplasia) while there was no significant difference in mean score between follicular carcinoma and follicular variant of papillary carcinoma (P>0.05); however, carcinoma of both types showed significantly higher HBME-1 score than both follicular adenoma and follicular hyperplasia (P<0.001). In addition, the score of follicular adenoma was significantly greater than that of follicular hyperplasia (P<0.05).Keywords: Galatin-3, HBME-1, Thyroid.
Nonsteroidal anti-inflammatory drugs (NSAIDs) are drugs that help reduce inflammation, which often helps to relieve pain. In this research new ibuprofen oxothiazolidnone derivatives were synthesized from the reaction of Schiff base derivatives of Ibuprofen with mercapto acetic acid VI a-c, to improve the potency and to decrease the drug's potential side effects, a new series of 4-thiazolidinone derivatives of ibuprofen was synthesized VI a-c . The characterizations of the compounds were identified by using FTIR, 1HNMR technique and by measuring the physical properties.
A new ligand [N- (1,5- dimethyl -3- oxo- 2 – phenyl - 2 ,3 – dihydro -1H- pyrazol -4- ylcarbamothioyl) acetamide] (AAD) was synthesized by reaction of acetyl isothiocyanate with 4-aminoantipyrine, The ligand was characterized by micro elemental analysis C.H.N.S., FT-IR ,UV-Vis and 1H-13CNMR spectra, some transition metals complex of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From the obtained results the molecular formula of all prepared complexes were [M(AAD)2(H2O)2]Cl2 (M+2 = Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedral.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreThrough the early childhood and after the ablactating the child learns acquired food habbits that might studying with him throughout his life. Here the parents role arises: teaching the child the sound food habits and hygienic styles and whatever beneficial to the health and with the sufficient quantities for the body. In this way the experiences the child learns at home will be of great help in his future life in choosing the suitable food after becoming more dependent in making his decisions and choices away from his parents. The results in this study showed that the averages of the children’s consumption of the high energy foods in comparison with the other highest consumption average , after that comes the con sumption of soft drills
... Show More