Preferred Language
Articles
/
jbcd-598
Immunohistochemical evaluation of FHIT and WWOX expression in normal oral mucosa, oral epithelial dysplasia and oral squamous cell carcinoma
...Show More Authors

Background: Oral squamous cell carcinoma is the most prevalent malignant neoplasm of the oral cavity which results from accumulated genetic and epigenetic alterations. It is not always inexorable and may be reversible if early intervention in the process can occur to prevent further genetic mutation and disease progression. The FHIT gene is a tumor suppressor gene located in FRA3B region which is the most active common fragile site, where DNA damage leading to aberrant transcripts and translocations frequently occur. The WWOX is a tumor suppressor gene that plays a central role in tumor suppression through transcriptional repression and apoptosis, with its apoptotic function the more prominent of the two. This study aimed to evaluate and compare the immunohistochemical expression of FHIT and WWOX in normal oral mucosa, oral epithelial dysplasia and oral squamous cell carcinoma and to correlate the expression of the mentioned markers with the clinicopathological features and to show the expression of studied markers with each other. Materials and methods: Fifty formalin-fixed, paraffin embedded tissue blocks (10 cases of normal oral mucosa, 19 cases of oral epithelial dysplasia, and 21 cases of oral squamous cell carcinoma) were included in this study. Immunohistochemical staining was performed using anti FHIT polyclonal antibody, and anti WWOX polyclonal antibody. Results: Positive IHC of FHIT was detected with high score in all cases of NOM, 16 cases (84%) of OED and 18 cases (86%) of OSCC. For WWOX expression positive IHC detected with high score in all cases (100%) of NOM, 14 cases (74%) of OED and 15 cases (71%) of OSCC. There was statistically highly significant correlation of both markers in OED and non significant correlation in OSCC, with significant differences among studied groups. Conclusions: These results signifying both markers cooperative tumor suppressive role and potential pathological transition from normal oral mucosa to dysplastic epithelium and subsequently cause malignant oral lesions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Mathematical connection skills and their relationship with productive thinking among secondary school students
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Blockchain Technology and its Potential Effect on the Banking Industry (China Case Study)
...Show More Authors

The aim of the research is to investigate potential effects of the finance industry and block-chain to general business of financing in particular, as well as its shortcomings and difficulties. To answer the research questions, the researcher used the objective narrative-analytical descriptive approach and included a qualitative analysis of Blockchain technology. The process of Blockchain technology based on their industries, the authors were selected based on their reputation in the Blockchain field. The research found that Blockchain can improve the efficiency of the banking industry's various sections. It has the ability to upgrade and transfer wages across borders, financial reporting and compliance, as well as trade finance

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (220)
Crossref (218)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Composites Science
Sawdust-Based Concrete Composite-Filled Steel Tube Beams: An Experimental and Analytical Investigation
...Show More Authors

Incorporating waste byproducts into concrete is an innovative and promising way to minimize the environmental impact of waste material while maintaining and/or improving concrete’s mechanical characteristics and strength. The proper application of sawdust as a pozzolan in the building industry remains a significant challenge. Consequently, this study conducted an experimental evaluation of sawdust as a fill material. In particular, sawdust as a fine aggregate in concrete offers a realistic structural and economical possibility for the construction of lightweight structural systems. Failure under four-point loads was investigated for six concrete-filled steel tube (CFST) specimens. The results indicated that recycled lightweight co

... Show More
View Publication
Scopus (5)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (9)
Crossref