Background: Lymphomas are a group of diseases caused by malignant lymphocytes that accumulate in lymph nodes and cause the characteristic clinical features of lymphadenopathy. Intercellular adhesion molecule-1 (ICAM-1) (CD54) is a transmembrane glycoprotein belonging to the immunoglobulin superfamily of adhesion molecules. Cortactin was first identified as one of the major substrates for src kinase. because it localized to Cortical actin structures, The aims of this study was to evaluate and compare the immunohistochemical of ICAM-1 expression as cell adhesion molecule marker and Cortactin expression as invasive marker. Material and Methods: This study was performed on (68) formalin-fixed, paraffin-embedded blocks, histopathologically diagnosed as lymphoma (head and neck lesions).Immunohistochemical staining of ICAM-1and Cortactin was performed on each case of the study sample. Results: The expression of ICAM-1 was membranous and cytoplasmic, the study cases showed a 98.5% positive reaction to ICAM-1, score 2 was the most common and found in 69.1% of all cases.The expression of Cortactin was cytoplasmic, 98.5% of cases expressed positive reactions to Cortactin, score 1 was the most common and found in 42.7% of all cases. Conclusion: Although the two markers showed a higher expression rate in all lymphomas (both HL and NHL) in this study, they can't be used to differentiate between them, nor can be used to differentiate between the subtypes of both HL and NHL. The high ICAM-1positive expression clarified that in addition to its role in cell-cell and cell-stromal interactions, it participates in proliferation, differentiation and invasion of malignant lymphoma cells.The present study is the first one that used Cortactin as an invasive marker for lymphoma.
Since I live in a society in which violence has become widespread, and killing among its own people flared up till they began to kill under the excuse of taking shelter, in these pages I would like to explain the status of taking shelter in the light of Islamic Law (Sharia), exploring scholars’ opinions in the legitimacy or illegitimacy of this issue according to the legal standards.
And, to acquaint people, and myself in the first place, with the true nature and the gravity of this issue; to expose it to those who are unaware of it; to remind those who are already aware of it. I would refute the fabrications, remove the suspicions which surround it untill it made the forbidden permissible; the wrong right. I would explain to those
Adopting a policy of attracting investments in all countries, whether developing or developed prevailed, especially after the global crisis, and this trend is imposed by considerations of political and development (urban, economic, and social) can be formulated as a rational policy to solve many problems related to patterns of urban growth, economic, social, and including the problem of housing. As the reality of the housing sector in Iraq will require the allocation of substantial resources to promote it by the research problem is the lack of financial resources and the inability of investments to meet the various requirements including the requirements of economic sectors, particularly in the field of housing, infrastructure an
... Show MoreT.V photo in modern shows has emerged with special characteristics and signs that have developed in cope with the development of medium and technique. This leads to adding a variety of aesthetic dimensions which are capable of attracting audience because of its communicative elements that have an important role in increasing of T.V show Watching. As a result, the research is limited to methodological Framework as the problem. The problem of the research deals with emerging the aesthetic dimensions of T.V photo. The major question is (what are the aesthetic and communicative dimension of T.V Photo?). The research aims at finding out the aesthetic dimensions of T.V photo in modern artworks. The significance of the research on the presented
... Show MoreDrought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreThere are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called grap
... Show More