Cancer stem cells (CSCs) are defined as a population of cells present in tumours, which can undergo self-renewal and differentiation. Identification and isolation of these CSCs using putative surface markers have been a priority of research in cancer. With this background we selected pancreatic normal and tumor cells for this study and passaged them into animal tissue culture medium. Further staining was done using alkaline phosphatase and heamatoxilin staining. Blue to purple colored zones in undifferentiated pluripotent stem cells and clear coloration in the chromatin material indicated pancreatic cells. Further studies on the cell surface marker CD 44 were done using ELISA. For this, the protein was extracted from cultivated normal and tumor pancreatic cells and absorbance was taken in ELISA reader. However, there was no significant difference in optical density values obtained with normal and tumor pancreatic cells indicating further studies are required for upregulation of CD44 in tumor cells. Reverse Transcriptase-polymerase chain reaction (RT-PCR) amplification of insulin growth factor binding protein 5 (IGF-BP5), showed negative result with pancreatic tumor, indicating there is no gene expression in tumor cell.
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this paper, isobutane (R-600a) is used as a suitable substitute for (R-134a) when changing the length of capillary tube. And the experimental data on capillary tube are obtained under different conditions such as (subcooling and ambient temperatures) on domestic refrigerator (9ft3 size), this data shows that (R-600a) a suitable substitute for (R134a) .The test presented a model for a steady state, two-phase flow in capillary tube for vapour compression system .The numerical model depends on conservation equations (mass, energy and momentum) as wall as the equation of state for refrigerant. The solution methodology was implemented by using finite difference techniques. The system results indicate that it is possible to change the refri
... Show MoreThe infection with H. Pylori stimulates a signaling cascade that causes the generation of Cytokines and provokes Oxidative stress that is involved in the chronic inflammatory response leads to Gastric cancers. Reactive oxygen species (ROS) produce 8-Hydroxydeoxyguanosine (8-OHdG), the persistent oxidative DNA damage product. The study objective was to assess if there was a link between inflammatory cytokine levels and the presence of Oxidative DNA damage in Gastric tumor patients. In addition, evaluation of the diagnostic and prognostic value of Oxidative DNA damage and inflammatory cytokine biomarkers for Stomach cancers is being conducted. The study was accomplished on medically diagnosed Stomach cancer patients before any form of trea
... Show MoreBackground: Although radiological diagnostic studies (RDS) are an important and acceptable part of medical practice, it is not without hazards. It is associated with increased risk of cancer. Unfortunately the typical and safe dose of each radiological examination is not known. Most of our knowledge of cancer risk comes from studies of survivors of those exposed to whole body radiation from atomic bomb in Hiroshima & Nagasaki, jobs associated with radiation exposure, Chernobyl survivors & patients treated with radiation therapy for cancer and other diseases.
Objectives To estimate radiation dose received by patients from diagnostic radiological examinations and lifetime
... Show MoreIn a connected graph , the distance function between each pair of two vertices from a set vertex is the shortest distance between them and the vertex degree denoted by is the number of edges which are incident to the vertex The Schultz and modified Schultz polynomials of are have defined as:
respectively, where the summations are taken over all unordered pairs of distinct vertices in and is the distance between and in The general forms of Schultz and modified Schultz polynomials shall be found and indices of the edge – identification chain and ring – square graphs in the present work.
The current study examined the impact of using PowerPoint presentation on EFL student’s attendance, achievement and engagement. To achieve the aim of this study, three null hypotheses have been posed as follows: There is no statistically significant difference between the mean score of the experimental group attendance and that of the control one; there is no statistically significant difference between the mean score of the experimental group achievement and that of the control one, and there is no statistically significant difference between the mean score of the experimental group engagement and that of the control one. To verify a hypothesis, a sample of sixty students is chosen randomly from the third year, department of English,
... Show MoreAsthma is chronic inflammatory disease affecting 5% of world population. Characterized by eosinophilic type2 inflammation. FKBP51 immunophilin, important modular protein of glucocorticoid receptor (GR). We aimed to evaluate immunocytochemical localization of GR and FKBP51 in induced sputum cells by using immunocytochemical method and immunofluorescent ant-FKBP51 and anti –GR antibody and estimation of IgE and Type 2 inflammatory cytokine IL-5,IL-13 by ELISA technique.GR in the sputum show non-significant decrease of cytoplasmic distribution of the patient groups and highly significant increase in steroid treated patients and non-significant increase in nuclear distribution in non-steroid, FKBP51 nuclear localization show non-significant i
... Show More