The invasion and spread of cancer cells are two of the most notable characteristics of malignant tumors. Recent studies suggest that the epithelial-mesenchymal transition (EMT) has been linked to this significant occurrence. It is linked to the absence of the epithelial brow and the presence of mesenchymal facial hair. The aims of the present study were to explore the immunohistochemical staining of vimentin and E-cadherin ex vivo as EMT markers and assess their potential as predictive biomarkers for transitional cell cancer (TCC). In this study, 55 paraffin-embedded biopsies from TCC patients and 10 autopsies that appeared to be normal were included. Immunohistochemistry was used to produce patterns of vimentin and E-cadherin expression. W
... Show MoreIn this article, the casting method was used to prepare poly(methyl methacrylate)/hydroxyapatite (PMMA/HA) nanocomposite films incorporated with different contents (0.5, 1, and 1.5 wt%) of graphene nanoplatelets (Gnp). The chemical properties and surface morphology of the PMMA/HA blend and PMMA/HA/Gnp nanocomposite were characterized using FTIR, and SEM analysis. Besides, the thermal conductivity, dielectric and electrical properties at (1–107 Hz) of the PMMA/HA blend and PMMA/HA/Gnp composites were investigated. The structural analysis showed that the synthesized composites had a low agglomerated state, with multiple wrinkles of graphene flakes in the PMMA/HA blend. The thermal conductivity was improved by more than 35-fold its value for
... Show MoreAbstract: Fluoroquinolones drugs are an important class of wide
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreIn The Name of Allah Most Gracious Most Merciful
Scholars, past and present, have paid attention to the books of Fasting and Hajj, and they have compiled literature on that, and they have written treatises and researches. The best days, and as for the pilgrimage, it is one of the great pillars of Islam, which God Almighty has distinguished by making its rituals in the best of places, which is the Sacred House of God.
Praise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad, and upon his whole family and companions, but after: God Almighty has instituted types of acts of worship and classes of obedience that, if performed by the servant, would link him with his Creator and connect with his Lord. And for the sake of these worship, and the greatest of them: the worship of i'tikaaf, for souls need rest and recuperation from the struggle of life and its concerns, concerns and anguish, and people differ in their attitudes and interests in the means of recreation, and many people consider the outing and travel the best way in which they breathe from their toil and toil, and reclaim their strength and the advised adult He fin
... Show MoreThe Battle of Kadesh is replete with many military arrangements that reflect the tremendous development of war preparations in the thirteenth century BC; where the expressive pictures the Egyptians left on some of the walls of their temples show the tremendous ability to organize and divide the forces and the great development that affected the war machine. Furthermore, the text accompanied these pictures reveal some news about that battle, which is considered one of the most important wars in the ancient world. Thus, the importance of the study lies in the fact that it examines one of the most important battles of the ancient Near East, the results of which had great repercussions on the region. This is because it is the most abundant B
... Show MoreThe researcher used the experimental approach due to its suitability and the nature of the research problem. The research community was represented by the eighth-grade students in the Rozak Elementary Mixed School affiliated with the General Directorate of Education in Erbil / the center, for the academic year (2021-2022), the number is (96) students, and the research sample consisted of (63) male and female students, with (31) in the experimental group, and (32) in the control group, and (11) students were excluded by (5) students from the experimental group, and (6) students from the control group, as the excluded, are students who failed and were absent from the lessons, and accordingly, the research sample became composed of (52) mal
... Show MoreThe research aims to demonstrate the impact of the acceptable solvency of the National Insurance Company on the investment activity in it, as the research assumes the existence of a statistically significant relationship between the acceptable solvency variable and the investment variable, and the researcher took the National Insurance Company as a place to conduct the research, as it is the first insurance company Watania was established in the fifties of the last century, and it has a long history in the practice of investment activity, and the company’s financial statements for the period from (2010-2019) were relied on, and the annual reports issued by the company as well as records are tools for gathering information, and
... Show More