Colorectal cancer (CRC) remains a leading cause of cancer-related deaths worldwide, with tumor angiogenesis playing a pivotal role in its progression and metastasis. CD144 (VE-cadherin), a calcium-dependent adhesion molecule, is critical for endothelial cell integrity and has been linked to tumor angiogenesis and cancer stem cell phenotypes. This study aimed to evaluate the immunohistochemical expression of CD144 in benign colorectal lesions, normal adjacent tumor tissue (NRAT), and tumor tissues to elucidate its role in colorectal cancer progression. Multiple techniques, including immunohistochemistry, flow cytometry, Western blot, and qPCR, were used to assess CD144 expression and its association with the VEGF/VEGFR2 signaling pat
... Show MoreGenetic variation was studied in 22 local and imported samples collected from local Iraqi market by using Single sequence repeat (SSR-PCR). Six primers set were used in this study. These primers produced 33 bands. Molecular weights of these bands ranged between 100 bp to 1500 bp. The number of polymorphic bands is 24, whereas the number of monomorphic bands is 9. The results of Dendrogram of the studied samples depended on SSR-PCR results by using Jaccard coefficient for genetic similarity was distributed the samples into 10 groups. This Dendrogram revealed a higher similarity between Iraqi/Balad green bell pepper and Iraqi/Yousifia green bell pepper with 1 value. This value is the highest between samples in comparison with lowest values (0
... Show MoreBACKGROUND: Many genetic factors are known to be related to osteoporosis, and currently the role of the glucagon-like peptide-1 receptor (GLP-1R) gene in bone health has been studied intensively. Some variation of this gene, such as rs1042044 and rs6458093, are known to be linked to metabolic diseases and lower bone mineral density, however their specific contribution to osteoporosis remains largely unexplored. Therefore, this study was conducted to investigate the combined genotypic effect of rs1042044 and rs6458093 as a genetic risk factor for osteoporosis in postmenopausal Iraqi women.METHODS: Blood samples from 75 osteoporosis patients and 75 healthy controls, aged 45-85, were collected. DNA was extracted, and a region of GLP-1R
... Show MoreBackground. Gene polymorphisms affect etanercept’s pharmacokinetics, pharmacodynamics, and side effects. This effect is evidenced by the extensive genetic variation in the drug’s targets. Objectives. This study aims to find the association between different genotypes of the promoter region of the TNF-α gene at -308G/A(rs1800629), -857C/T(rs1799724), -863 C/A(rs1800630), -1031 T/C (rs1799964), -806 C/T (rs4248158) and -376 G/A (rs1800750) and the side effects of ETN that occurred to Iraqi RA patients. Method. The trial included patients with rheumatoid arthritis who had been using ETN for at least six months. The participants were from the Baghdad Teaching Hospital Rheumatology Unit. The PCR was sequenced to determine the polymo
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreIn this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show More