Background: Malignant lymphoma is a term that describes primary tumors of the lymphoreticular system, almost all of which arise from lymphocytes.MMP-1 is the most ubiquitously expressed interstitial collagenase, a subfamily of MMPs that cleaves stromal collagens. It is also called collagenase-1.TIMPs which inhibits MMP activity and thereby restrict extracellular matrix breakdown, TIMP-1 is a stromal factor that has a wide spectrum of functions in different tissues. Material and Methods: This study was performed on (68) formalin-fixed, paraffin-embedded blocks, histopathologically diagnosed as lymphoma (head and neck lesions). Immunohistochemical staining of MMP1and TIMP1 was performed on each case of the study sample. Results: The expression of MMP1was cytoplasmic, the study cases showed a 98.5% positive reaction to MMP1, score 3 was the most common and found in 60.3% of all cases.The expression of TIMP1was cytoplasmic, 92.6% of cases expressed positive reactions to TIMP1, score 1 was the most common and found in 57.4% of all cases. Conclusion: This study showed for the first time the effect of MMP-1 in HL, which is considered to be as an invasive and migratory cell marker. A significant difference was found among the subtypes of NHL in relation to TIMP1, TIMP1inhibits the effect of MMP1 and as MMP1 is elevated the TIMP1 will be elevated too.
The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreBackground: The first and second choice for vascular access in patients with end stage renal disease (ESRD) is radio cephalic and brachio cephalic arteriovenous fistula (AVF).In patients with failed previous AVF e or poorly visualized or impalpable cephalic veins, the basilic vein can be mobilized and superficialized to create an AVF with the brachial artery.Objective: The aim of this study is to report our experience at the Vascular Surgery Department/ Surgical Specialty Hospital in brachio-basilic (BB) vascular access for hemodialysis.Methods: From January 2006 to December 2009, 31 patients with ESRD whose cephalic veins were thrombosed or impalpable or had previous unsuccessful vascular access procedures were referred to the Vascular
... Show MoreFacial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show MoreWireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I
... Show MoreBackground: The etiology of Systemic lupus erythematosus seems to be multifactorial including environmental as well as genetic factors. The genetic predisposition was supported by the occurrence of Systemic lupus erythematosus in more than one member of a family as well as in identical twins.
Aim of the study: To determine the human leukocyte antigen typing class I (A and B) in patients with Systemic Lupus Erythematousus disease.
Methods: Patients group consisted of 44 Iraqi Arab Muslims patients with Systemic lupus erythematosus disease who presented to Baghdad Medical City from January 2010 to January 2012 from Baghdad Province. The second control group consisted from 80 Iraqi Arab Muslims volunteers from hospital employees and t
There are many images you need to large Khneh space With the continued evolution of storage technology for computers, there is a continuing need and are required to reduce Alkhoznip space Pictures Zguet pictures in a good way, the way conversion Alamueja to Purifiers
Ground water is a vital source for agricultural sector and rural communities. The global climate change is expected to change the hydrometeorological processes parameters. The climate considered as part of the southern Iraqi desert general climate with long, extremely hot, and dry summer and short wet period with little rain. So it is vital to investigate the groundwater quality for irrigation purposes. The meteorological data of Samawa meteorological station for the period 1980-2015 was used to evaluate the climatic conditions for Muthana Governorate. It was found that the averages of annual rainfall was 105.7mm and the everages of evaporation is 3182 mm, while the mean monthly relative humidity % , mean t
... Show MoreThe researcher highlighted in his research on an important subject that people need, which is the excuse of ignorance in Islamic law. , As the flag of light and ignorance of darkness. Then the researcher lameness of the reasons for research in this subject as it is one of the assets that should be practiced by the ruler and the judge and the mufti and the diligent and jurisprudent, but the public should identify the issues that ignore ignorance and issues that are not excused even if claimed ignorance.
Then the researcher concluded the most important results, and recommendations that he wanted to set scientific rules for students of science and Muslims in general, to follow the issues of legitimacy and learn its provisions and i
Institutions and companies are looking to reduce spending on buildings and services according to scientific methods, provided they reach the same purpose but at a lower cost. On this basis, this paper proposes a model to measure and reduce maintenance costs in one of the public sector institutions in Iraq by using performance indicators that fit the nature of the work of this institution and the available data. The paper relied on studying the nature of the institution’s work in the maintenance field and looking at the type of data available to know the type and number of appropriate indicators to create the model. Maintenance data were collected for the previous six years by reviewing the maintenance and financial dep
... Show More