Background: Oral squamous cell carcinoma is the most prevalent malignant neoplasm of the oral cavity which results from accumulated genetic and epigenetic alterations. It is not always inexorable and may be reversible if early intervention in the process can occur to prevent further genetic mutation and disease progression. The FHIT gene is a tumor suppressor gene located in FRA3B region which is the most active common fragile site, where DNA damage leading to aberrant transcripts and translocations frequently occur. The WWOX is a tumor suppressor gene that plays a central role in tumor suppression through transcriptional repression and apoptosis, with its apoptotic function the more prominent of the two. This study aimed to evaluate and compare the immunohistochemical expression of FHIT and WWOX in normal oral mucosa, oral epithelial dysplasia and oral squamous cell carcinoma and to correlate the expression of the mentioned markers with the clinicopathological features and to show the expression of studied markers with each other. Materials and methods: Fifty formalin-fixed, paraffin embedded tissue blocks (10 cases of normal oral mucosa, 19 cases of oral epithelial dysplasia, and 21 cases of oral squamous cell carcinoma) were included in this study. Immunohistochemical staining was performed using anti FHIT polyclonal antibody, and anti WWOX polyclonal antibody. Results: Positive IHC of FHIT was detected with high score in all cases of NOM, 16 cases (84%) of OED and 18 cases (86%) of OSCC. For WWOX expression positive IHC detected with high score in all cases (100%) of NOM, 14 cases (74%) of OED and 15 cases (71%) of OSCC. There was statistically highly significant correlation of both markers in OED and non significant correlation in OSCC, with significant differences among studied groups. Conclusions: These results signifying both markers cooperative tumor suppressive role and potential pathological transition from normal oral mucosa to dysplastic epithelium and subsequently cause malignant oral lesions.
The solar eclipse occurs at short time before the crescent birth moment when the moon near any one of moon orbit nodes It is important to determine the synchronic month which is used to find Higree date. The 'rules' of eclipses are:
Y= ± 0.997 of Earth radius , the solar eclipse is central and 0.997 < |Y| < 1.026 the umbra cone touch the surface of the Earth, where Y is the least distance from the axis of the moon's shadow to the center of the Earth in units of the equatorial radius of the Earth.
A new model have been designed, depend on the horizontal coordinates of the sun, moon, the distances Earth-Moon (rm), Earth-sun (rs) and |Y| to determine the date and times of total solar eclipse and the geogra
... Show MoreLet be a commutative ring with 1 and be left unitary . In this papers we introduced and studied concept P-small compressible (An is said to be P-small compressible if can be embedded in every of it is nonzero P-small submodule of . Equivalently, is P-small compressible if there exists a monomorphism , , is said to be P-small retractable if , for every non-zero P-small submodule of . Equivalently, is P-small retractable if there exists a homomorphism whenever as a generalization of compressible and retractable respectively and give some of their advantages characterizations and examples.
The research tagged (functional enhancement and its reflection on industrial product systems) focused on the possibility of enhancing industrial products in terms of form and functionality in a way that they are able to meet the needs of the user through the impact of technology and modern technologies on the functional enhancement of industrial products and their effectiveness in achieving formal and functional design variables, and producing products Industrial products are highly efficient and durable in order to improve them in order to meet the needs of the user, the transfer of technology between life forms and industrial products is desirable because the functional enhancement processes that occurred in general on industrial produ
... Show MoreA good performance of reinforced concrete structures is ensured by the bond between steel and concrete, which makes the materials work together, forming a part of solidarity. The behavior of the bond between the reinforcing bar and the surrounding concrete is significant to evaluate the cracking control in serviceability limit state and load capacity in the ultimate limit state. In this investigation, the bond stresses between reinforcing bar and reactive powder concrete (RPC) was considered to compare it with that of normal strength concrete (NSC). The push-out test with short embedment length is considered in this study to evaluate the bond strength, bond stress-slip relationship, and bond stress-crack width relationsh
... Show MoreA particulate composite material was prepared by adding the Titanium dioxide (TiO2) with a particle size of (75-150) µm to Epoxy resin at weight percentage of (10%,20%,30%,40%,50%).The following some mechanical properties were studied,fracture toughness, hardness.casting preparation methods were used in this study includes preparing plate of matrix and composites. specimens were prepared according to ASTM for the Mechanical properties tests. After that Another samples were heat treated for three and six hour at 65C?. Fracture toughness (Kic) represent for stress intensity factor results were showed that the curve of three hours aging increases in fracture toughness (Kic) for composites but for six hours aging increases fracture tough
... Show MoreLike the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Sig
... Show MoreThe study aims at showing the role of tax audit in Impact the quality of tax statements. Tax audit is one of the most important means used by tax management to identify taxable revenues in a just, fair manner. The quality of statements relies on the extent to which the information provided by taxpayers is true and accurate. Tax audit works is compatible with the strategy of increasing tax adherence and detecting non-adherence cases and penalizing those who commit such violations. The study reached a number of results and conclusions. One of the most important results is that tax audit helps improve the information content of the taxpayers tax statements. This leads to recalculating taxable incomes and re-fixing t
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
Let be a commutative ring with identity. The aim of this paper is introduce the notion of a pseudo primary-2-absorbing submodule as generalization of 2-absorbing submodule and a pseudo-2-absorbing submodules. A proper submodule of an -module is called pseudo primary-2-absorbing if whenever , for , , implies that either or or . Many basic properties, examples and characterizations of these concepts are given. Furthermore, characterizations of pseudo primary-2-absorbing submodules in some classes of modules are introduced. Moreover, the behavior of a pseudo primary-2-absorbing submodul
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show More