Medulloblastomas and ependymomas are the most common malignant brain tumors in children. However genetic abnormalities associated with their development and prognosis remain unclear. Recently two gene fusions, KIAA1549–BRAF and SRGAP3–RAF1 have been detected in a number of brain tumours. We report here our development and validation of RT-RQPCR assays to detect various isoforms of these two fusion genes in formalin fixed paraffin embedded (FFPE) tissues of medulloblastoma and ependymoma. We examined these fusion genes in 44 paediatric brain tumours, 33 medulloblastomas and 11 ependymomas. We detected both fusion transcripts in 8/33, 5/33 SRGAP3 ex10/RAF1 ex10, and 3/33 KIAA1549 ex16/BRAF ex9, meduloblastomas but none in the 11 ependymomas examined. This investigation provided evidence to the value of RT-RQPCR assays for the detection of these fusion genes in large-scale studies on FFPE tissues. The study also reports the first detection of RAF fusion genes in meduloblstomas.
the digital public relations aim at make the workers getting the necessary information about the governmental institutions where they work and the enveronment surrounding them. it also tries to let the workers get the special knowlege of tthe publich relations and their jobs like the works of planning , arranging the active communication and executive skills needed in their writing , editing , special art skills for designing , production and technological skills to deal with the computer.
the problem of the research includes some questions as :
1- what are the uses achieved by degetal public relations workers at Iraqi universities (Baghdad, Mustansiriya, and Iraqi)
2- what are the tools used to apply digital public relations
Potentially inappropriate prescribing is the prescribing of a medication that may cause more harm than benefit, the elderly population aged 65 years or older is more prone to potentially inappropriate prescribing because of alterations in their physiology, pharmacokinetics, and pharmacodynamics as well as polypharmacy and comorbidities, Beers list is a screening tool that help doctors to detect potentially inappropriate prescribing in geriatric patients and is designed to solve this problem, the aim of this study is to measure the prevalence of potentially inappropriate prescribing among psychiatric patients using the Beers criteria as an assessment tool and find the relationship between duration of hospitalization, comorbidities and pol
... Show MorePrevious reports demonstrated the effectiveness of silibinin hemisuccinate as a potential intraocular pressure-lowering agent. The exact mechanism by which silibinin exerted this effect has not yet been documented, but might suggested to interfere with aqueous humor formation. The present study was designed to evaluate the comparative efficacy of silibinin as IOP lowering agent to that of betaxolol in normotensive rabbits, and the interaction of silibinin with betaxolol as a way for investigating the possible mechanism of action of silibinin in this respect. The effects of instillation of 0.75% silibinin solution and 0.5% betaxolol eye drops in the eyes of normotensive rabbits were evaluated using indentation tonometry. The results showe
... Show MoreDisabled people are among the most important groups that need attention, care, and financial and moral care. They cannot fulfill the requirement of life normally without care from a person to meet their special needs. The disability is either mental or physical. The Iraqi government has paid attention to this category by adopting a law for this category, represented by Law No. (38) for the year (2013), which keeps their rights and duties in Iraqi society by establishing institution of persons with disabilities and special needs of the Ministry of Labor and Social Affairs to create a modern society politically, socially, culturally or economically. In view of the importance of this group in society, the media reinforces the communit
... Show MoreThis paper is a review of the genus Sitta in Iraq, Five species of this genus are recognized
Sitta kurdistanica, S. neumayr, S. europaea, S.dresseri and S. tephronota. Geographical
distribution and systematic nots were given for separation and identification, also some notes
on nest building and nest sites of S. tephronota supporting by figures are presented.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show More