Objectives: To identify the frequency and types of microsatellite instability among a group of sporadic CRC patients and to correlate the findings with clinicopathological characteristics. Methods: During an 8-month period, all patients with sporadic CRC who attended to two teaching hospitals in Baghdad, Iraq were recruited to this cross-sectional study regardless of age, sex, ethnicity, or tumor characteristics. Demographic, clinical, and histopathological features were recorded. DNA was extracted from FFPE-blocks of the resected tumors and normal tissues. PCR amplification of five microsatellite mononucleotide repeat loci (BAT25, BAT26, NR-21, NR-24, and MONO-27) and 2 pentanucleotide repeat control markers (Penta C and Penta D) was performed to determine the MSI status. Capillary electrophoresis and Genetic Analyzer 3500 (Applied Biosystem, Japan) were used to separate and examine the products. Data were analyzed by Genescan software (Promega, USA). Instability of two or more loci is considered MSI-H. Result: In this study, ages of the 45 recruited patients ranged between 20-80 years, with a mean±SD of 55±12.3 years; of them, 31(68.9%) were ≥50 years; 25 (55.6%) were males. Rectal bleeding was the most frequent presenting feature [22 (48.9%)] patients; 23 (51.1%) of CRCs were located at recto-sigmoid region, 29 (64.4%) were T3 tumors, 34(75.5%) were non-mucinous adenocarcinoma, 39(86.7%) were moderately differentiated, 17 (37.8%) patients had stage III tumors; and 25 (55.5%) had lymphovascular invasion. MSI-H was seen in 5/45 (11.1%) patients; 3(60%) of them were ≥50 years, 4(80%) were males, 3(60%) were smokers, 2 (40%) presented with intestinal obstruction and altered bowel habits each; 4(80%) had T3 tumors, 3(60%) had mucinous adenocarcinomas [p=0.004], 2(40%) had stage II tumor and stage III each. Conclusion: The frequency of MSI-H among the recruited patients with CRC was 5/45 (11.1%) and it was significantly associated with mucinous adenocarcinoma subtype. NR-24 and NR-21 were the most prevalent instable markers.
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThere is substantial data supporting the importance of both endogenous and exogenous estrogen in maintaining reproductive health and preventing chronic disease, androgens in women's health are rarely discussed. This is one of the first researches to investigate correlates of blood testosterone concentrations in women with osteopenia, in anticipation of the growing interest in the role of androgens in women's health. A 65 volunteer women were enrolled in the current study, they were divided into two groups, 35 postmenopausal women with osteopenia were in the first group, and the second group contained 30 postmenopausal women without osteopenia as a control. Blood samples were collected from all participants and analyzed for testosterone l
... Show MoreObjective: To assess the major anti-tuberculosis drugs available to patients at primary health care centers in Baghdad city. Methodology: A descriptive cross-sectional study design is carried out in order to achieve the objectives of the study by using the assessment technique in primary health care centers from December 29th, 2014 to July 10 th, 2015. probability sampling is select based on the study design. Eighteen primary health care centers are select according to criteria of sample to the study and for the purpose of the study, is select (6) sectors and (11) Primary Health Care Centers (PHCC) from Bagh
A case-control study was performed to examine age, gender, and ABO blood groups in 1014 Iraqi hospitalized cases with Coronavirus disease 2019 (COVID-19) and 901 blood donors (control group). The infection was molecularly diagnosed by detecting coronavirus RNA in nasal swabs of patients.
Mean age was significantly elevated in cases compared to controls (48.2 ± 13.8