The pancreatic ductal adenocarcinoma (PDAC), which represents over 90% of pancreatic cancer cases,
has the highest proliferative and metastatic rate in comparison to other pancreatic cancer compartments. This
study is designed to determine whether small nucleolar RNA, H/ACA box 64 (snoRNA64) is associated with
pancreatic cancer initiation and progression. Gene expression data from the Gene Expression Omnibus (GEO)
repository have shown that snoRNA64 expression is reduced in primary and metastatic pancreatic cancer as
compared to normal tissues based on statistical analysis of the in Silico analysis. Using qPCR techniques,
pancreatic cancer cell lines include PK-1, PK-8, PK-4, and Mia PaCa-2 with different levels of snoRNA64,
including PK-1, PK-8, PK-4, and Mia PaCa-2. The level of expression is correlated with the cell line epithelial
or mesenchymal characteristics. Cell lines displaying epithelial characteristics such as PK-1, PK-8 show high
levels of snoRNA64 meanwhile, cell lines displaying mesenchymal characteristics such as PK-4, Mia PaCa-2
show low levels of snoRNA64. The level of expression is correlated with the cell line epithelial or
mesenchymal characteristics. After knocking down the PK-8 with high snoRNA64 expression, the epithelial
markers E. cadherin (E-cad) and Cytokeratin-8 (CK-8) are decreased, while mesenchymal markers Vimentin
(Vim), Cytokeratin-19 (CK-19), Metalloprotease -2 (MMP-2), and Metalloprotease-3 (MMP-3) are activated.
Those changes suggest that PK-8 responding to the snoRNA64 knock down protocol and increase in
mesenchymal function. Together, snoRNA64 expression may participate in epithelial to mesenchymal
transition (EMT) and mesenchymal to epithelial transition (MET), in which during metastasis these processes
are crucial. In addition, snoRNA64 may be considered as a potential diagnostic biomarker for both early and
invasive stages of PDAC. And due to its gradual expression decreases, it may be considered a barrier in tumor
progression.
Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show Morethe electron correlation effect for inter-shell can be described by evaluating the fermi hole and partial fermi hole for Li atom comparing with Be+ and B+2 ions
Globally, the COVID-19 pandemic’s development has presented significant societal and economic challenges. The carriers of COVID-19 transmission have also been identified as asymptomatic infected people. Yet, most epidemic models do not consider their impact when accounting for the disease’s indirect transmission. This study suggested and investigated a mathematical model replicating the spread of coronavirus disease among asymptomatic infected people. A study was conducted on every aspect of the system’s solution. The equilibrium points and the basic reproduction number were computed. The endemic equilibrium point and the disease-free equilibrium point had both undergone local stability analyses. A geometric technique was used
... Show MoreA- The research problem: the research problem which is the garments industry, as a
whole it does not rely on a single system in the sizes of the clothing and the working
companies, see that it is not plausible that the sizes be unificd and consistent in all companies.
The current sizes in the domestic Iraqi markets are not suitable for some females ,on the other
hand the Iraqi industry suffers the lack of a modern standard for some Iraqis female bodies.
B- The Signifiance of the research: lies in the study of the diversity of the human body
sizes and naming them to reflect the desires and requirements of the consumer and try to find
a method to meet their expectations as well as to raise the level of garments industr
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show More