Objectives: To identify the frequency and types of microsatellite instability among a group of sporadic CRC patients and to correlate the findings with clinicopathological characteristics. Methods: During an 8-month period, all patients with sporadic CRC who attended to two teaching hospitals in Baghdad, Iraq were recruited to this cross-sectional study regardless of age, sex, ethnicity, or tumor characteristics. Demographic, clinical, and histopathological features were recorded. DNA was extracted from FFPE-blocks of the resected tumors and normal tissues. PCR amplification of five microsatellite mononucleotide repeat loci (BAT25, BAT26, NR-21, NR-24, and MONO-27) and 2 pentanucleotide repeat control markers (Penta C and Penta D) was performed to determine the MSI status. Capillary electrophoresis and Genetic Analyzer 3500 (Applied Biosystem, Japan) were used to separate and examine the products. Data were analyzed by Genescan software (Promega, USA). Instability of two or more loci is considered MSI-H. Result: In this study, ages of the 45 recruited patients ranged between 20-80 years, with a mean±SD of 55±12.3 years; of them, 31(68.9%) were ≥50 years; 25 (55.6%) were males. Rectal bleeding was the most frequent presenting feature [22 (48.9%)] patients; 23 (51.1%) of CRCs were located at recto-sigmoid region, 29 (64.4%) were T3 tumors, 34(75.5%) were non-mucinous adenocarcinoma, 39(86.7%) were moderately differentiated, 17 (37.8%) patients had stage III tumors; and 25 (55.5%) had lymphovascular invasion. MSI-H was seen in 5/45 (11.1%) patients; 3(60%) of them were ≥50 years, 4(80%) were males, 3(60%) were smokers, 2 (40%) presented with intestinal obstruction and altered bowel habits each; 4(80%) had T3 tumors, 3(60%) had mucinous adenocarcinomas [p=0.004], 2(40%) had stage II tumor and stage III each. Conclusion: The frequency of MSI-H among the recruited patients with CRC was 5/45 (11.1%) and it was significantly associated with mucinous adenocarcinoma subtype. NR-24 and NR-21 were the most prevalent instable markers.
Massive multiple-input multiple-output (massive-MIMO) is considered as the key technology to meet the huge demands of data rates in the future wireless communications networks. However, for massive-MIMO systems to realize their maximum potential gain, sufficiently accurate downlink (DL) channel state information (CSI) with low overhead to meet the short coherence time (CT) is required. Therefore, this article aims to overcome the technical challenge of DL CSI estimation in a frequency-division-duplex (FDD) massive-MIMO with short CT considering five different physical correlation models. To this end, the statistical structure of the massive-MIMO channel, which is captured by the physical correlation is exploited to find sufficiently
... Show MoreTriticale is a hybrid of wheat and rye grown for use as animal feed. In Florida, due to its soft coat, triticale is highly vulnerable to Sitophilus oryzae L. (rice weevil) and there is interest in development of methods to detect early-instar larvae so that infestations can be targeted before they become economically damaging. The objective of this study was to develop prediction models of the infestation degree for triticale seed infested with rice weevils of different growth stages. Spectral signatures were tested as a method to detect rice weevils in triticale seed. Groups of seeds at 11 different levels (degrees) of infestation, 0–62%, were obtained by combining different ratios of infested and uninfested seeds. A spectrophotometer wa
... Show MoreIn today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har
... Show MoreP. aeruginosa is one of the complex targets for antimicrobial chemotherapy. Also, it is intrinsically resistant to several antibiotics. It produces β-lactamases enzymes that are responsible for the widespread β-lactam antimicrobial resistance. There are three major groups of β-lactamase enzymes, MBLs and ESBLs forming Pseudomonas is a major issue for the treatment of burns victims. Methods: A total of 28 clinical isolates related to P. aeruginosa have been obtained from the burns specimens from patients attending to AL-Imam hospital/Baghdad-Iraq, through the period from October 2015 to March 2016. Also, all isolates have been recognized as P. aeruginosa via utilizing bacteriological assay and confirmed by Vitek 2. In addition, the suscep
... Show MoreThe target of this study was to study the natural phytochemical components of the head (capsule) of Cynara scolymus cultivated in Iraq. The head (capsule) of plant was extracted by maceration in70% ethanol for 72 hours, and fractioned by hexane, chloroform and ethyl acetate. Preliminary qualitative phytochemical screening was performed on the ethyl acetate fraction for capsule was revealed the presence of flavonoid and aromatic acids. These were examined by (high -performance liquid chromatography) (HPLC diodarray), (high- performance thin-layer chromatography)(HPTLC).
Flavonoids were isolated by preparative layer chromatography and aromatic acid was isolated by preparative high-
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin