Objectives: To identify the frequency and types of microsatellite instability among a group of sporadic CRC patients and to correlate the findings with clinicopathological characteristics. Methods: During an 8-month period, all patients with sporadic CRC who attended to two teaching hospitals in Baghdad, Iraq were recruited to this cross-sectional study regardless of age, sex, ethnicity, or tumor characteristics. Demographic, clinical, and histopathological features were recorded. DNA was extracted from FFPE-blocks of the resected tumors and normal tissues. PCR amplification of five microsatellite mononucleotide repeat loci (BAT25, BAT26, NR-21, NR-24, and MONO-27) and 2 pentanucleotide repeat control markers (Penta C and Penta D) was performed to determine the MSI status. Capillary electrophoresis and Genetic Analyzer 3500 (Applied Biosystem, Japan) were used to separate and examine the products. Data were analyzed by Genescan software (Promega, USA). Instability of two or more loci is considered MSI-H. Result: In this study, ages of the 45 recruited patients ranged between 20-80 years, with a mean±SD of 55±12.3 years; of them, 31(68.9%) were ≥50 years; 25 (55.6%) were males. Rectal bleeding was the most frequent presenting feature [22 (48.9%)] patients; 23 (51.1%) of CRCs were located at recto-sigmoid region, 29 (64.4%) were T3 tumors, 34(75.5%) were non-mucinous adenocarcinoma, 39(86.7%) were moderately differentiated, 17 (37.8%) patients had stage III tumors; and 25 (55.5%) had lymphovascular invasion. MSI-H was seen in 5/45 (11.1%) patients; 3(60%) of them were ≥50 years, 4(80%) were males, 3(60%) were smokers, 2 (40%) presented with intestinal obstruction and altered bowel habits each; 4(80%) had T3 tumors, 3(60%) had mucinous adenocarcinomas [p=0.004], 2(40%) had stage II tumor and stage III each. Conclusion: The frequency of MSI-H among the recruited patients with CRC was 5/45 (11.1%) and it was significantly associated with mucinous adenocarcinoma subtype. NR-24 and NR-21 were the most prevalent instable markers.
Adenosine deaminase (ADA; Ec: 3.5.4.4), 5´- Nucleotidase (5´– NT; Ec: 3.1.3.5), and AMP – amino hydrolase (AMP – deaminase AMPDA; Ec: 3.5.4.6) activities were measured in sera of ovarian cancer patients before surgery, and after chemotherapy. The results indicated that ADA specific activity increased significantly (P<0.05), while 5´-NT and AMPDA specific activity decreased significantly (P<0.05) in ovarian cancer patients before surgery in comparison with those of their corresponding control women and benign tumors groups. When the activities of these enzymes were measured after chemotherapy, a significant decrease (P<0.05) in ADA activity, and a significant increase (P<0.05) in 5´- NT and AMPDA activities w
... Show MoreIn order to investigate the levels of reduced glutathione GSH and α1-antitrypsine in the sera of 20 type 2 diabetic patients and 10 healthy subjects, were enrolled in this study. A significant reduction in GSH level was found in the patient group compared with control. On the other hand a significant elevation in α1-antitrypsine in patient compared with control was observed. Correlation between α1-antitrypsine and reduced glutathion was found to be positive (+Ve) for diabetes mellitus type2 patients and negative (-Ve) for healthy control with r values 0.257 and – 0.339 respectively. In conclusion the depletion of GSH as antioxidant defense insured higher free radical generation in diabetic patients
... Show MoreBackground: Chronic periodontitis is an inflammatory disease that affects the supporting tissues of the teeth and it’s common among adults. Smoking is an important risk factor for periodontitis induces alveolar bone loss. Alkaline phosphatase enzyme is involved in the destruction of the human periodontium. It is produced by many cells such as polymorphonuclear leukocytes, osteoblasts, macrophages and fibroblasts within the area of the periodontium and gingival crevice. Osteocalcin is one of the most abundant matrix proteins found in bones and the only matrix protein synthesized exclusively there. Smaller Osteocalcin fragments are found in areas of bone remodeling and are actually degradation products of the bone matrix.The purpose of
... Show MoreBackground: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show MoreMalaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f
... Show MoreAbstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Heart disease identification is one of the most challenging task that requires highly experienced cardiologists. However, in developing nations such as Ethiopia, there are a few cardiologists and heart disease detection is more challenging. As an alternative solution to cardiologist, this study proposed a more effective model for heart disease detection by employing random forest and sequential feature selection (SFS). SFS is an effective approach to improve the performance of random forest model on heart disease detection. SFS removes unrelated features in heart disease dataset that tends to mislead random forest model on heart disease detection. Thus, removing inappropriate and duplicate features from the training set with sequential f
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More