Background: Lymphomas are a group of diseases caused by malignant lymphocytes that accumulate in lymph nodes and cause the characteristic clinical features of lymphadenopathy. Intercellular adhesion molecule-1 (ICAM-1) (CD54) is a transmembrane glycoprotein belonging to the immunoglobulin superfamily of adhesion molecules. Cortactin was first identified as one of the major substrates for src kinase. because it localized to Cortical actin structures, The aims of this study was to evaluate and compare the immunohistochemical of ICAM-1 expression as cell adhesion molecule marker and Cortactin expression as invasive marker. Material and Methods: This study was performed on (68) formalin-fixed, paraffin-embedded blocks, histopathologically diagn
... Show MoreA field experiment was carried out at the research station of the College of Agriculture - Wasit University / Kut, during the fall season 2021 in soil with texture (sandy mixture) using the RCBD design in the arrangement of splintered plates and with three replications, to study the effect of spraying different combinations of organic emulsion (Appetizer) and NPK nano fertilizer with urea fertilizer on the growth of synthetic cultivars of yellow corn. The main panels included three synthetic varieties of yellow corn (Fajr1, Sumer and Baghdad3), which symbolized by (V1,V2,V3) in sequence, while the secondary panels included five fertilization treatments in which mineral fertilizer (urea) was used 46% nitrogen with the full recomme
... Show MoreThe aim of this paper is to derive a posteriori error estimates for semilinear parabolic interface problems. More specifically, optimal order a posteriori error analysis in the - norm for semidiscrete semilinear parabolic interface problems is derived by using elliptic reconstruction technique introduced by Makridakis and Nochetto in (2003). A key idea for this technique is the use of error estimators derived for elliptic interface problems to obtain parabolic estimators that are of optimal order in space and time.
Many additives are used to improve the performance of cables in terms of increasing their flame retardancy, thermal stability, thermal conductivity, and other characteristics. Unfortunately, most of these additives contain heavy metals. Therefore, the main objective of this study is to introduce a material representing a new generation of environmentally friendly heavy metal-free stabilizers for cable grade poly(vinyl chloride) that can compete with traditional materials in terms of performance and distinctive properties. This unique additive is Oxydtron, a synthetic silicate or simply nanocement. The tests performed are rheological properties represented by a capillary rheometry analysis, limiting o
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.
A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More