The pancreatic ductal adenocarcinoma (PDAC), which represents over 90% of pancreatic cancer cases,
has the highest proliferative and metastatic rate in comparison to other pancreatic cancer compartments. This
study is designed to determine whether small nucleolar RNA, H/ACA box 64 (snoRNA64) is associated with
pancreatic cancer initiation and progression. Gene expression data from the Gene Expression Omnibus (GEO)
repository have shown that snoRNA64 expression is reduced in primary and metastatic pancreatic cancer as
compared to normal tissues based on statistical analysis of the in Silico analysis. Using qPCR techniques,
pancreatic cancer cell lines include PK-1, PK-8, PK-4, and Mia PaCa-2 with different levels of snoRNA64,
including PK-1, PK-8, PK-4, and Mia PaCa-2. The level of expression is correlated with the cell line epithelial
or mesenchymal characteristics. Cell lines displaying epithelial characteristics such as PK-1, PK-8 show high
levels of snoRNA64 meanwhile, cell lines displaying mesenchymal characteristics such as PK-4, Mia PaCa-2
show low levels of snoRNA64. The level of expression is correlated with the cell line epithelial or
mesenchymal characteristics. After knocking down the PK-8 with high snoRNA64 expression, the epithelial
markers E. cadherin (E-cad) and Cytokeratin-8 (CK-8) are decreased, while mesenchymal markers Vimentin
(Vim), Cytokeratin-19 (CK-19), Metalloprotease -2 (MMP-2), and Metalloprotease-3 (MMP-3) are activated.
Those changes suggest that PK-8 responding to the snoRNA64 knock down protocol and increase in
mesenchymal function. Together, snoRNA64 expression may participate in epithelial to mesenchymal
transition (EMT) and mesenchymal to epithelial transition (MET), in which during metastasis these processes
are crucial. In addition, snoRNA64 may be considered as a potential diagnostic biomarker for both early and
invasive stages of PDAC. And due to its gradual expression decreases, it may be considered a barrier in tumor
progression.
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreIn this work, two cone-inverted cylindrical and cross-hybrid dielectric resonator antennas are stacked and excited by the coaxial probe method with an operating standard resonant frequency of 5.438 GHz. A drawback of these standard Dielectric Resonator Antennas (DRAs) is their narrow bandwidth. For good antenna performance, a stacked DR geometry and a thick dielectric substrate having a low dielectric constant are desired since this provides large bandwidth, better radiation power, reduces conductor loss and nonappearance of surface waves. Many approaches, such as changing the shape of the dielectric resonator, have been used to enhance bandwidth. Using DRA, having the lowest dielectric constant, increases the bandwidth and the electroma
... Show MoreIn this research, the removal of cadmium (Cd) from simulated wastewater was investigated by using a fixed bed bio-electrochemical reactor. The effects of the main controlling factors on the performance of the removal process such as applied cell voltage, initial Cd concentration, pH of the catholyte, and the mesh number of the cathode were investigated. The results showed that the applied cell voltage had the main impact on the removal efficiency of cadmium where increasing the applied voltage led to higher removal efficiency. Meanwhile increasing the applied voltage was found to be given lower current efficiency and higher energy consumption. No significant effect of initial Cd concentration on the removal efficiency of cadmium b
... Show MoreThe injection of Low Salinity Water (LSWI) as an Enhanced Oil Recovery (EOR) method has recently attracted a lot of attention. Extensive research has been conducted to investigate and identify the positive effects of LSWI on oil recovery. In order to demonstrate the impact of introducing low salinity water into a reservoir, simulations on the ECLIPSE 100 simulator are being done in this work. To simulate an actual reservoir, an easy static model was made. In order to replicate the effects of injecting low salinity water and normal salinity, or seawater, the reservoir is three-phase with oil, gas, and water. It has one injector and one producer. Five cases were suggested to investigate the effect of low salinity water injection with differen
... Show MoreMicrofinance Institutions (MFIs) offers small loans with easy repayment system and till now these institutions have served millions of needy people around the globe. This study highlights the hurdles influence the smooth working and growth of Microfinance institution in Egypt. The structured interviews were conducted from the top and mid-level managers of MFI's. This study revealed that interest rate, political and economic conditions, corruption, customer outreach, competition and technology are the important elements for MFI's success. It is evident that lack of use of technology and less importance drawn on customer outreach programs are the main challenges of MFI's in Egypt. This study provides a roadmap for practitioners and strategic
... Show MoreThis study analyzes how to make use of the resources in the marshlands of Iraq and how to utilize them, especially after the water returns to these areas and they are revitalized. We take an example of AL- Saheen Marsh and plan an ideal tourist resort there. This example can further expand to include other parts of the marshlands. The resort will utilize the local environment and tourist characteristics as it will have a feel and architectural resemblance to the houses and buildings that are currently built there. In addition the transportation methods will be the same as those used by the locals. Yet the resort will still posses all the facilities required by a modern tourist resort that includes all the services that will make
... Show MoreThis study deals with an important area in the field of linguistics, namely person deixis.
The study aims at: (1) Describing the notion of deixis, its importance, and its place in the field
of linguistics, (2) Presenting a detailed illustration of person deixis, and (3) Conducting an
analysis of person deixis in one of Synge‟s plays Riders to The Sea according to Levinson‟s
model. The most important aim of these three is the third one (the analysis). To achieve this
aim, the researcher depends on Levinson‟s (1983) descriptive approach. According to the
descriptive approach of deixis, the category of person deixis can be defined as the encoding of
the participant roles in the speech situation. This encoding is r
A gantry robot is one of the most common types of industrial robots with linear movement. This type of robot is also known as a Cartesian or linear robot. It is an automated industrial system that moves along linear paths, enabling it to create a 3D envelope of the space in which it operates. A robot of this type has a standardised configuration process because it can have several sets of axes, such as X, Y and Z. The gantry robot picks up products from several places, so it can search through various locations. Afterwards, it carefully deposits the products on a conveyor belt for the next stage of the procedure or final shipment. This integration enables continuous and automated material flow
... Show MoreSo I present in the hands of the honorable reader what God Almighty has made easy for me in terms of what I dealt with in the rule (the principle of permissive things) and what branches from it and what is related to it.
This research was divided into an introduction, a preface, three demands, and a conclusion.
The preamble is to explain the meaning of the rule in language and terminology and the definition of the legal rule and what is related to it. The first requirement is to explain the rule that we have in our hands and the words related to its text - and is it a fundamentalist or jurisprudential rule? .
As for the second requirement - in the difference of scholars and their opinions in whether the origin of things is permi