Abstract Background: Acute myeloid leukemia (AML) results from sequential genetic alterations in a normal hematopoietic stem cell or its progenitors giving rise to an autonomous clone that dominates the bone marrow leading to marrow failure. MicroRNAs are short non-coding nucleic acid sequences that regulate post-transcriptional gene expression by base-pairing with their target mRNAs. MiRNAs can be secreted into extracellular fluids and carried to target cells by vesicles or bound to proteins. Intracellular and circulating miRNAs are believed to be useful markers in the diagnosis, prognosis, and treatment of various cancers. Practically, circulating miRNAs are more stable at room temperatures and extreme conditions. Purpose: This study aimed to compare the expression of miR-126-3p and miR-423-5p in patients and normal subjects and correlate their expression with response to induction therapy and with their 2-year overall survival rate. Patients and methods: Circulating miR-126-3p and miR-423-5p was measured in the plasma of 43 adult AML patients and 35 age- and sex-matched controls by quantitative reverse transcriptase PCR. The fold change in differential expression for each gene was calculated using the comparative cycle threshold method. Results: There was an increase in the expression of the studied miRNAs in patients compared to the control group. The average expression fold change of miR-126-3p was 3.02 (p= 0.010). The average expression fold change of miR-423-5p was 4.09 (p= 0.003). No significant correlation was found between the expression of miR-126-3p and miR-423-5p in the studied AML patients (r = 0.094, p = 0.22). Furthermore, no relationship was found between the expression of the studied miRNAs and response to induction therapy or the 2-year survival rate. Conclusion: Although further studies are needed, our findings highlight the studied circulating miRNAs as possible diagnostic markers for AML.
Transmission lines are generally subjected to faults, so it is advantageous to determine these faults as quickly as possible. This study uses an Artificial Neural Network technique to locate a fault as soon as it happens on the Doukan-Erbil of 132kv double Transmission lines network. CYME 7.1-Programming/Simulink utilized simulation to model the suggested network. A multilayer perceptron feed-forward artificial neural network with a back propagation learning algorithm is used for the intelligence locator's training, testing, assessment, and validation. Voltages and currents were applied as inputs during the neural network's training. The pre-fault and post-fault values determined the scaled values. The neural network's p
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreThe main goal of this paper is to study and discuss a new class of meromorphici "functions[ which are multivalent defined by [fractional calculus operators. Coefficients iestimates , radiisi of satarlikeness , convexityi and closed-to-iconvexity are studied. Also distortion iand closure theorems for the classi" , are considered.
The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show More The most likely fusion reaction to be practical is Deuterium and Helium-3 (ð·âˆ’ð»ð‘’
3 ), which is highly desirable because both Helium -3 and Deuterium are stable and the reaction produces a 14 ð‘€ð‘’𑉠proton instead of a neutron and the proton can be shielded by magnetic fields. The strongly dependency of the basically hot plasma parameters such as reactivity, reaction rate, and energy for the emitted protons, upon the total cross section, make the problems for choosing the desirable formula for the cross section, the main goal for our present work.
The main aim of image compression is to reduce the its size to be able for transforming and storage, therefore many methods appeared to compress the image, one of these methods is "Multilayer Perceptron ". Multilayer Perceptron (MLP) method which is artificial neural network based on the Back-Propagation algorithm for compressing the image. In case this algorithm depends upon the number of neurons in the hidden layer only the above mentioned will not be quite enough to reach the desired results, then we have to take into consideration the standards which the compression process depend on to get the best results. We have trained a group of TIFF images with the size of (256*256) in our research, compressed them by using MLP for each
... Show MoreThe authors introduced and addressed several new subclasses of the family of meromorphically multivalent -star-like functions in the punctured unit disk in this study, which makes use of several higher order -derivatives. Many fascinating properties and characteristics are extracted systematically for each of these newly identified function classes. Distortion theorems and radius problems are among these characteristics and functions. A number of coefficient inequalities for functions belonging to the subclasses are studied, and discussed, as well as a suitable condition for them is set. The numerous results are presented in this study and the previous works on this
... Show MoreThe aim of this investigation is to present the idea of SAH – ideal , closed SAH – ideal and closed SAH – ideal with respect to an element , and s- of BH – algebra .
We detail and show theorems which regulate the relationship between these ideas and provide some examples in BH – algebra .
Let R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .