The main problem established by a discovery of a thyroid nodule is to discriminate between a benign and malignant lesion. Differential diagnosis between follicular thyroid cancer (FTC) and benign follicular thyroid adenoma (FTA) is a great challenge for even an experienced pathologist and requires special effort. A developing number of some encouraging IHC markers for the differential diagnosis of thyroid lesions have emerged, including, Hector Battifora mesothelial (HBME-1) and galectin-3 (Gal-3). There was significant positive correlation between Galectin-3 and HBME-1 in follicular carcinoma and follicular variant of papillary carcinoma (r= 0.380, P= 0.041) and (r= 0.315, P=0.047) respectively. There was no significant correlation between Galectin-3 and HBME-1 in follicular adenoma and follicular hyperplasia. Immunohistochemical expression of Galectin-3(Gal-3) there was highly significant difference (P<0.001) among study groups (FC, FVPC, FA, follicular hyperplasia) while there was no significant difference in mean of immunohistochemical score of Galectin-3 between follicular carcinoma, follicular variant of and papillary carcinoma (P>0.05); however, carcinoma of both types showed significantly higher Galectin-3 score than both follicular adenoma and follicular hyperplasia (P<0.001). In addition, the score of follicular adenoma was significantly greater than that of follicular hyperplasia (P<0.05). Immunohistochemical expression of HBME-1 immunohistochemical expression of HBME-1was highly significance among study groups (FC, FVPC, FA, follicular hyperplasia) while there was no significant difference in mean score between follicular carcinoma and follicular variant of papillary carcinoma (P>0.05); however, carcinoma of both types showed significantly higher HBME-1 score than both follicular adenoma and follicular hyperplasia (P<0.001). In addition, the score of follicular adenoma was significantly greater than that of follicular hyperplasia (P<0.05).Keywords: Galatin-3, HBME-1, Thyroid.
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThis paper investigates the experimental response of composite reinforced concrete with GFRP and steel I-sections under limited cycles of repeated load. The practical work included testing four beams. A reference beam, two composite beams with pultruded GFRP I-sections, and a composite beam with a steel I-beam were subjected to repeated loading. The repeated loading test started by loading gradually up to a maximum of 75% of the ultimate static failure load for five loading and unloading cycles. After that, the specimens were reloaded gradually until failure. All test specimens were tested under a three-point load. Experimental results showed that the ductility index increased for the composite beams relative to the reference specim
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show MoreAn experimental investigation has been made to study the influence of using v-corrugated aluminum fin on heat transfer coefficient and heat dissipation in a heat sink. The geometry of fin is changed to investigate their performance. 27 circular perforations with 1 cm diameter were made. The holes designed into two ways, inline arrangement and staggered in the corrugated edges arrangement. The experiments were done in enclosure space under natural convection. Three different voltages supplied to the heat sink to study their effects on the fins performance. All the studied cases are compared with v-corrugated smooth solid fin. Each experiment was repeated two times to reduce the error and the data recorded after reaching t
... Show MoreThe importance of the current research lies in the importance of teaching competencies and the ability of the teacher to deal and success in his educational career. The research aimed to identify the degree of teaching competencies according to Hermann model of physical education teachers in Baghdad governorate. The descriptive method using the survey method was used on a randomly selected sample of 462 teachers and 314 school principals. After the completion of the survey, the Hermann scale forms were distributed to the teachers. The forms of the teaching competency scale were distributed to their school principals as the direct supervisors of the teachers' evaluation. After completing the survey, the results of each scale were classified
... Show More