The pancreatic ductal adenocarcinoma (PDAC), which represents over 90% of pancreatic cancer cases,
has the highest proliferative and metastatic rate in comparison to other pancreatic cancer compartments. This
study is designed to determine whether small nucleolar RNA, H/ACA box 64 (snoRNA64) is associated with
pancreatic cancer initiation and progression. Gene expression data from the Gene Expression Omnibus (GEO)
repository have shown that snoRNA64 expression is reduced in primary and metastatic pancreatic cancer as
compared to normal tissues based on statistical analysis of the in Silico analysis. Using qPCR techniques,
pancreatic cancer cell lines include PK-1, PK-8, PK-4, and Mia PaCa-2 with different levels of snoRNA64,
including PK-1, PK-8, PK-4, and Mia PaCa-2. The level of expression is correlated with the cell line epithelial
or mesenchymal characteristics. Cell lines displaying epithelial characteristics such as PK-1, PK-8 show high
levels of snoRNA64 meanwhile, cell lines displaying mesenchymal characteristics such as PK-4, Mia PaCa-2
show low levels of snoRNA64. The level of expression is correlated with the cell line epithelial or
mesenchymal characteristics. After knocking down the PK-8 with high snoRNA64 expression, the epithelial
markers E. cadherin (E-cad) and Cytokeratin-8 (CK-8) are decreased, while mesenchymal markers Vimentin
(Vim), Cytokeratin-19 (CK-19), Metalloprotease -2 (MMP-2), and Metalloprotease-3 (MMP-3) are activated.
Those changes suggest that PK-8 responding to the snoRNA64 knock down protocol and increase in
mesenchymal function. Together, snoRNA64 expression may participate in epithelial to mesenchymal
transition (EMT) and mesenchymal to epithelial transition (MET), in which during metastasis these processes
are crucial. In addition, snoRNA64 may be considered as a potential diagnostic biomarker for both early and
invasive stages of PDAC. And due to its gradual expression decreases, it may be considered a barrier in tumor
progression.
An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-
... Show MoreIn this study, the CR-39 detector technique was used, to estimate the uranium concentration from the soil in midland refineries Company (Doura refine (, Baghdad, Iraq. Uranium concentrations in soil samples have been measured using solid state nuclear track detector type CR-39. Nine soil samples were collected from different areas within the Doura refinery and other soil samples were collected form Abu Tayara Street and ALshortaa District outside the refinery for comparison. The results showed variable values for uranium concentrations. The average value of uranium concentration was found to be 0.37 ppm in doura refinery. For areas outside the refinery, the concentration of uranium was 0.008 ppm. Thes
... Show More Thsst researcher problem of delays faced by researchers are all waiting to evaluate their standards by the experts who must take their views to extract the truth Virtual important step first step in building standards whatsoever, then the difference of opinion among experts about the paragraphs Whatever the scope of their functions, leading to confusion in maintaining these paragraphs or delete? Or ignore the views and opinion of the researcher to maintain the same? Or as agreed upon with the supervisor if he was a student? Especially if the concepts of a modern new building.
Therefore, the researcher sought to try to find a solution to her problem to conduct an experiment to test building steps
Local news is an important topic of the press because of its importance to readers. It touches their daily life in one way or another, which makes them interested in and followers of them. Hence the importance of local news, as it interests a wide segment of readers.
There are many sources of newspapers for obtaining local news, as these sources are distributed to the newspaper's own sources and external sources.
Self-sources are the newspaper's own sources, through which it is possible to obtain this news, such as the representatives of the newspaper and its correspondents and the journalists working in it. This is the example in this way.
The external sources are distributed to local and international news agencies and sa
Colonialism as a movement was very popular in Europe more than two centuries before. It aimed at controlling and exploiting several countries in Africa and Asia in addition to imposing their power and control on uninhabited islands. It received adherence and criticism as well. There also appeared activists and nations who stood against it and its practices. English novels discussed this notion greatly by pointing out the bad practices of the colonizers and how the colonized received them. This paper explores two narrative fictions that tackle the different aspects of the term. While Defoe, in Robinson Crusoe (1719), shows a colonial European figure who expresses his superiority, Wells, in “The Country of the Blind” (1904), deconstructs
... Show MoreThe present study investigates the realization and significance of textual themes in the organizational structure of M.A theses and Ph.D. dissertations, namely: the abstracts, introductions and conclusions, since in such parts the students depend on their own expressions, styles and constructions to express different viewpoints, plans, inferences, etc. The study also investigates the similarities and differences between M.A theses and Ph.D. dissertations concerning the use of textual themes;it sets out to conduct a detailed analysis of textual themes used in such texts. In conducting such an analysis, the study adopts Halliday's (1994) approach of textual themes. The results of such an analysis have clearly shown that, in spite of the di
... Show Moreإن النجاح في أداء المتطلبات الفنية والخططية في أي من الألعاب ألرياضيه يستوجب امتلاك العناصر الاساسيه المتعلقة بطبيعة الاداء ونوع الفعالية الرياضية الممارسة , لذا فان اغلب الألعاب الرياضية تعتمد على مكونات ألقدره التوافقيه والادراكيه الحسيه بوصفها احد العناصر الاساسيه في المستويات العليا لما توفره من قاعدة اقتران للصفات البدنيه والحر كيه وقدرات أجهزة الجسم الوظيفية , وفقا للأسس المعتمدة في بناء مهاراته, وع
... Show MoreBreast cancer is the most commonly diagnosed cancer and remains one of the main reasons of cancer-related mortality in women worldwide. KRAS variant rs61764370 (T>G) is associated with an increased risk of occurrence of many cancers, Here The case-control study was accomplished on 135 women including 45 women with breast cancer patients, 45 women with benign breast lesions and 45 healthy women to analyze the association of KRAS variant rs (61764370 T>G) with breast cancer. LCS 6 variant in KRAS gene was amplified by using specific primers, then genotype was detected after sequencing the PCR products. The results showed that the genotype and allele frequency of TT and GT allele of KRAS
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More