Colorectal cancer (CRC) is the most common gastrointestinal malignancy and one of the top ten common cancers worldwide with approximately 2 million cases. There are multiple risk factors that could lead to CRC emergence; of which are genetic polymorphisms. Excision repair cross-complementing group 2 (ERCC2) gene encodes for ERCC2 enzyme which plays a crucial role in maintaining genomic integrity by removing DNA adducts. Several studies suggested that there could be a link between genetic polymorphisms of ERCC2 gene and the risk of CRC development. Hence the present study aims to validate the relationship between the following ERCC2 single nucleotide polymorphisms (rs13181, rs149943175, rs530662943, and rs1799790) and CRC susceptibility. A total of 121 participants were enrolled in this case control study; 72 CRC patients and 49 apparently healthy individuals. CRC patients aged 56.34 ±11.89 years and 41 (56.9%) were males while control group were 53.20 ± 17.33 years and 26 (53.1%) of them are males. Genotyping was performed using polymerase chain reaction (PCR) followed by Sanger sequencing then the association between genetic polymorphisms and CRC susceptibility was examined. GA genotype and A allele of rs149943175 were associated with lower risk of CRC development [OR 95% (CI)= 0.3 (0.1-0.88); P=0.02 and 0.4 (0.1-0.9); P=0.03 respectively]. However, GA genotype and A allele carriers of rs530662943 had significantly increased risk compared to GG genotype and G allele respectively [OR 95%(CI)= 5.17 (1.1-24.0); P=0.03 and 4.76 (1.0-21.6); P=0.04 respectively]. Additional stratified analyses showed that carriers of heterozygous genotype of rs149943175 who non-smokers, females or BMI figures less than 25 are less likely to develop CRC compared to wild genotype carriers. Taken together, genetic polymorphisms of ERCC2 modulate the susceptibility of CRC malignancy.
In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreIntroduction: The stringent response is a bacterial adaptation mechanism triggered by stress conditions, including nutrient limitation. This response helps bacteria survive under harsh conditions, such as those encountered during infection. A key feature of the stringent response is the synthesis of the alarmone (p)ppGpp, which influences various bacterial phenotypes. In several bacterial species, stringent response activation significantly affects biofilm formation and maintenance. Methods: Clinical specimens were collected from multiple hospitals in Baghdad, Iraq. Staphylococcus aureus was identified using conventional biochemical tests. The PCR technique was applied to detect mecA, icaA, and icaD genes, while the Vitek 2 compac
... Show More