Mutations in genes encoding proteins necessary for detoxifying oxidative stress products have been predicted to increase susceptibility to lung cancer (LC). Despite this, the association between waterpipe tobacco smoking (WP), genetic polymorphisms, and LC risk remains poorly understood. This is the first study to explore the relationship between WP tobacco smoking and these genetic factors. Previously, we investigated the association of GSTP1 SNPs (rs1695-A/G and rs1138272-C/T) with LC in Iraqi males who smoke WP. Here, we expanded our analysis to include GSTM1 (active/null) and GSTT1 (active/null) genotypes, both individually and in combination with GSTP1 SNPs. Multiplex PCR and RFLP-PCR assays were utilized to determine the genotypes of 123 cases and 129 controls. No significant association was observed between GSTM1-null or GSTT1-null genotypes and LC risk, either separately or in combination with variant genotypes of GSTP1 (rs1695 "AG+GG" and rs1138272 "CT+TT"). However, smoking WP and carrying null genotypes elevated the risk five-fold for GSTM1-null (OR 5.17, 95 % CI 2.02–13.24, P<0.001) and three-fold for GSTT1-null (OR 3.08, 95 % CI 1.55–6.13, P=0.001) compared to non-smokers carrying active genotypes. Conversely, genotype distribution analysis based on LC histological types did not indicate an increased risk of LC. Lung cancer is a complex multifactorial disease. WP smoking and GSTs genetic polymorphisms might be associated with an increased risk of developing LC. However, our data did not confirm an association between GST polymorphisms alone and the risk of LC.
In this paper , certain subclass of harmonic multivalent function defined in the exterior of the unit disk by used generalize hypergeometric functions is introduced . In This study an attempting have been made to investigate several geometric properties such as coefficient property , growth bounds , extreme points , convolution property , and convex linear combination .
Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
In this work, we consider a modification of the Lotka-Volterra food chain model of three species, each of them is growing logistically. We found that the model has eight equilibrium points, four of them always exist, while the rest exist under certain conditions. In terms of stability, we found that the system has five unstable equilibrium points, while the rest points are locally asymptotically stable under certain satisfying conditions. Finally, we provide an example to support the theoretical results.
Many fuzzy clustering are based on within-cluster scatter with a compactness measure , but in this paper explaining new fuzzy clustering method which depend on within-cluster scatter with a compactness measure and between-cluster scatter with a separation measure called the fuzzy compactness and separation (FCS). The fuzzy linear discriminant analysis (FLDA) based on within-cluster scatter matrix and between-cluster scatter matrix . Then two fuzzy scattering matrices in the objective function assure the compactness between data elements and cluster centers .To test the optimal number of clusters using validation clustering method is discuss .After that an illustrate example are applied.
Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
Android OS is developing very fast, and because of being an open source OS, it is vulnerable to many problems that are manifested to users directly or indirectly. Poor application launch time is one of these problems. In this paper, a set of sixteen experiments is established to distinguish the factors that have the most evident effects on application launch time in Android mobiles. These factors are application, launch and kill, events, and storage. Mann Kendall (MK) test, one way analysis of variance (ANOVA), and Design of Experiment (DOE) are used to prove the influence of factors statistically. As a result of the experiments, the application factor, especially the third party applications level, has the most prominent effects on appl
... Show MoreMany neuroscience applications, including understanding the evolution of the brain, rely on neural cell instance segmentation, which seeks to integrate the identification and segmentation of neuronal cells in microscopic imagery. However, the task is complicated by cell adhesion, deformation, vague cell outlines, low-contrast cell protrusion structures, and background imperfections. On the other hand, existing segmentation approaches frequently produce inaccurate findings. As a result, an effective strategy for using the residual network with attention to segment cells is suggested in this paper. The segmentation mask of neural cells may be accurately predicted. This method is built on U-net, with EfficientNet serving as the e
... Show MoreLet L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.
The study evaluates the incidence of inferior alveolar nerve injuries in mandibular fractures, the duration of their recovery, and the factors associated with them. Fifty-two patients with mandibular fractures involving the ramus, angle, and body regions were included in this study; the inferior alveolar nerve was examined for neurological deficit posttraumatically using sharp/blunt differentiation method, and during the follow-up period the progression of neural recovery was assessed. The incidence of neural injury of the inferior alveolar nerve was 42.3%, comminuted and displaced linear fractures were associated with higher incidence of inferior alveolar nerve injury and prolonged recovery time, and recovery of inferior alveolar nerve fun
... Show MoreThe purpose of this paper is to solve the stochastic demand for the unbalanced transport problem using heuristic algorithms to obtain the optimum solution, by minimizing the costs of transporting the gasoline product for the Oil Products Distribution Company of the Iraqi Ministry of Oil. The most important conclusions that were reached are the results prove the possibility of solving the random transportation problem when the demand is uncertain by the stochastic programming model. The most obvious finding to emerge from this work is that the genetic algorithm was able to address the problems of unbalanced transport, And the possibility of applying the model approved by the oil products distribution company in the Iraqi Ministry of Oil to m
... Show More