Background: Malignant lymphomas represent about 5% of all malignancy of the head and neck region which can involve lymph nodes as well as soft tissue and bone of the maxillofacial region. Apoptosis is considered a vital component of various processes including normal cell turnover, proper development and functioning of the immune system. Inappropriate apoptosis is a factor in many human conditions including neurodegenerative diseases, ischemic damage, autoimmune disorders and many types of cancer. Expression of p53 Proteins in Hodgkin׳s and Non Hodgkin׳s lymphomas suggested that it can help in monitoring of patients and the markers may aid in controlling the progression of lymphoma and detect the degree of aggressiveness of the disease to give suitable treatment and management of patients. Material and methods: Sixty seven formalin-fixed, paraffin-embedded tissue, histopathologically diagnosed lymphoma blocks (head and neck lesions) as (24) Hodgkin’s Lymphoma and (43) Non Hodgkin’s Lymphoma. Immunohistochemical (IHC) technique was used for the evaluation of P53 monoclonal antibodies expression and correlated with the clinicopathological parameters. Results: The mean of expression of P53 in relation to tumor grades was different as it had a value of (51.2±13.5) in low grade tumors, (55.7±20) in the intermediate grade tumor and (45±17.6) in high grade tumors; consequently, this difference did not reached the level of statistical significance P(ANOVA) >0.05. Conclusions: This study had shown that there was no significant correlation between the mean of expression of P53 in HL and NHL.
The best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced.
... Show MoreObjective: Pregnancy-induced hypertension (PIH) is a major pregnancy complication that leads to maternal mortality. Here, we have scrutinized the correlation between serum levels of hydrogen peroxide (H2O2) and superoxide dismutase (SOD) in PIH.Methods: Serum samples were collected from 80 Iraqi women (40 women with PIH as patients group, 20 normotensive pregnant women as a positive control, and 20 normotensive non-pregnant women as a negative control) all groups were diagnosed clinically.Results: Serum of H2O2 and SOD levels was measured for all studied groups. Results showed that there were no significant variances in age and gestational age distribution between all studied groups. Furthermore, result showed that the serum level o
... Show MoreHematological parameters were used as a biomarker of sub chronic effect of dursban in Cyprinus carpio L. The common carp was exposed sub chronically to the 36, 53,113 µg /l concentrations of dursban for six weeks. During the experimental period the results showed a decrease in the red blood cell (RBC), white blood cell (WBC), hemoglobin (Hb), mean corpuscular volume (MCV), and packed cell volume (PCV) in the last two weeks of exposure, while the Mean corpuscular hemoglobin (MCH) and Mean corpuscular hemoglobin concentration (MCHC) were significantly increased. The present study indicates that sub chronic exposures of C.carpio to dursban alter the hematological parameters.
The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie
... Show MoreType 2 diabetes mellitus (T2DM) is the most frequent endocrinal disease commonly associated with thyroid disorders .The study is conducted at the Specialized Center for Endocrinology and Diabetes in Baghdad ,during December 2014 up to October 2015.This study was done to investigate the prevalence of anti- thyroid peroxidase (Anti-TPO) antibody in patients suffered from type 2 diabetes with thyroid disorders .The study groups included a total number of 80 subjects consisting of 60 type 2 diabetic patients divided into 20 hyperthyroidism subjects (group 1) ,20 hypothyroidism subjects (group 2), 20 euthyroidism subjects (group 3) and 20 healthy controls (group 4) . The fasting blood samples were analyzed for (T3,T4,TSH) by using Vitek Immuno d
... Show MoreThe recurrent somatic variations in
The aim of the study was to detect the frequency of R132 mutations in the
(January 25, 2011) represented a real opportunity to bring about fundamental changes in Egyptian foreign policy and to start a new phase that would cut off all the negative and problematic aspects of Egyptian politics in the period before the revolution. Through the employment of Egypt's huge balance and the role of historical is a civilization rooted in the roots of thousands of years and Islamic reference represented over more than a thousand years the Islamic medium of religion in the start of vision and tools to achieve the Egyptian national interest, and safeguarding Egyptian national security in its comprehensive sense. The research attempts to answer a central question: Is there a role for Egyptian soft power in the Islamic world
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More