Background: The American Joint committee on Cancer in their 8th edition staging manual regarded perineural invasion as one of the most important prognostic factors for Lip and Oral Cavity Squamous Cell Carcinoma, it also incorporated tumor depth of invasion in defining tumor size category in the new staging system. This study was conducted to evaluate the frequency of perineural invasion in oral squamous cell carcinoma and the effect of approaching tumor depth in this process. Materials and Methods: fifty-four formalin fixed paraffin embedded tissue blocks of radical resections of Oral Squamous Cell Carcinoma were cut and stained with Hematoxylin and Eosin stain, then evaluated for perineural invasion, with estimation of tumor depth of invasion for each case. Results: Perineural invasion was found in twenty-two cases of the study sample. The diameter of the largest nerve bundle that showed perineural invasion was found to have a positive significant correlation with tumor depth of invasion (p=0.025). Perineural invasion status in terms of (present, absent) showed a significant difference with patients’ age (p=0.037), also showed a significant association with tumor site (p=0.004), however, this association was non-significant in regard to tumor grade and stage (p=0.848, p=0.520) respectively. Conclusion: The attacking potential of preceding tumor depth and those cancers affecting young individuals may be reflected by the presence of neural infiltration by tumor cells. Tongue resected tumors should be carefully inspected for this deceptive biological process.
The aim of this study is to utilize the behavior of a mathematical model consisting of three-species with Lotka Volterra functional response with incorporating of fear and hunting cooperation factors with both juvenile and adult predators. The existence of equilibrium points of the system was discussed the conditions with variables. The behavior of model referred by local stability in nearness of any an equilibrium point and the conditions for the method of approximating the solution has been studied locally. We define a suitable Lyapunov function that covers every element of the nonlinear system and illustrate that it works. The effect of the death factor was observed in some periods, leading to non-stability. To confirm the theore
... Show MoreHead nurses are vital in understanding and encouraging knowledge sharing among their followers. However, few empirical studies have highlighted their contribution to knowledge-sharing behaviour in Online Health Communities (OHCs). In addition, scant literature has examined the moderating role of knowledge self-efficacy in this regard.
This study examines the moderating role of self-efficacy between the association of four selected individual factors of head nurses (i.e., Trust, Reciprocity, Reputation, and Ability to Share) and their knowledge-sharing behaviour in OHCs in Jordan.
<Objectives: The research aims to demonstrate the integration between Quantum Computing (QC) and Predictive Analysis (PA) and their role in reducing costs while achieving Sustainable Development Goals (SDGs). The study addresses the inefficiencies in calculating and measuring product costs under traditional systems and examines how QC and PA can enhance cost reduction and product quality to better meet customer needs. Additionally, the research seeks to strengthen the theoretical framework with practical applications, illustrating how this integration improves a company’s competitive position while promoting social, environmental, and economic sustainability. Methods: The study employs a descriptive analytical approach, focusi
... Show MoreA fixed firefighting system is a key component of fire safeguarding and reducing fire danger. It is installed as a permanent component in a structure to protect the entire or a portion of the building and its contents. The study aims to review the previous studies that deal with the evaluation of fire safety measures and their use in resolving problems associated with fire threats in buildings. For this reason, a number of previous studies in this field were reviewed compared with the NFPA code. The findings revealed that regulatory developments over the last several decades had created an atmosphere conducive to innovation. This has resulted in a growth in the number of fixed firefighting system types now obtainable. Th
... Show MoreThe present study aimed to investigate the histological changes of heart, lung, liver and kidney which caused by different concentrations (10, 20 and 40 mg/kg) of Ivabradine. Results of the study revealed some histological changes represented by aggregation of the lymphocytes around respiratory bronchioles of the lung. In the liver, the drug caused hepatocyte necrosis and infiltration of the lymphocytes. In Kidney, there are no histopathological modifications in the tissue after the animals treated with 10 mg\kg of Ivabradine. When the animals treated with Ivabradine drug at 20mg/kg of bw, dose showed vascular congestion between myocardial fibers of heart. Emphysematous c
... Show MoreChronic lymphocytic leukaemia (CLL) patients display a highly variable clinical course, with progressive acquisition of drug resistance. We sought to identify aberrant epigenetic traits that are enriched following exposure to treatment that could impact patient response to therapy.
Epigenome-wide analysis of DNA methylation was performed for 20 patients at two timepoints during treatment. The prognostic significance of differentially methylated regions (DMRs) was assessed in independent cohorts of 139 and 1
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More