The Vogue of the Restoration Comedy of Manners and George Etherage's The Man of Mode; or, Sir Fopling Flutter
Background: Invasion in oral cancer involves alterations in cell-cell and cell-matrix interactions that accompanied by loss of cell adhesion. Catenins stabilize cellular adherence junctions by binding to E-cadherin, which further mediates cell-cell adhesion and regulates proliferation and differentiation of epithelial cells. The Wnt/β-catenin pathway is one of the major signaling pathways in cell proliferation, oncogenesis, and epithelial-mesenchymal transition. Aims of the study: to detect immunohistochemical distribution pattern and different subcellular localization of β-catenin in oral squamous cell carcinoma and relate such expression to Bryne’s invasive grading system. Materials and Methods: This study included 30 paraffi
... Show MoreKE Sharquie, AA Noaimi, MA Al-Shukri, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 3
Background: Patients with type 2 diabetes have an increased prevalence of lipid abnormalities, contributing to their high risk of cardiovascular diseases (CVD).Glycated hemoglobin (HbA1c) is a routinely used marker for long-term glycemic control. In accordance with its function as an indicator for the mean blood glucose level, HbA1c predicts the risk for the development of diabetic complications in diabetic patients[2].Apart from classical risk factors like dyslipidemia, HbA1c has now been regarded as an independent risk factor for (CVD) in subjects with or without diabetes.Objective The aim of this study was to find out association between glycaemic control (HbA1c as a marker) and serum lipid profile in type 2 diabetic patients.Methods
... Show MoreThe problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.
The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreBackground Methotrexate (MTX) is a classical folic acid antagonist widely used in the treatment of malignant and non-malignant disorders. However, its clinical application is often restricted by concomitant adverse effects, including renal damage. Numerous studies have highlighted the role of oxidative stress and inflammation in mediating MTX-related nephrotoxicity. Therefore, the current study aimed to explore the possible renoprotective action of Citronellol (CT), a natural compound with prominent antioxidant and anti-inflammatory activities, against nephrotoxicity induced by MTX. Methods To fulfill our objective, 24 adult male Wistar rats were randomly allocated into four groups: control, MTX, 100 mg/kg CT plus MTX and 200 mg/kg C
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreBreast cancer is the most common cancer among women over the world. To reducing reoccurrence and mortality rates, adjuvant hormonal therapy (AHT) is used for a long period. The major barrier to the effectiveness of the treatment is adherence. Adherence to medicines among patients is challenging. Patient beliefs in medications can be positively or negatively correlated to adherence. Objectives: To investigate the extent of adherence and factors affecting adherence, as well as to investigate the association between beliefs and adherence in women with breast cancer taking AHT. Method: A cross-sectional study included 124 Iraqi women with breast cancer recruited from Middle Euphrates
... Show More