Mutations in genes encoding proteins necessary for detoxifying oxidative stress products have been predicted to increase susceptibility to lung cancer (LC). Despite this, the association between waterpipe tobacco smoking (WP), genetic polymorphisms, and LC risk remains poorly understood. This is the first study to explore the relationship between WP tobacco smoking and these genetic factors. Previously, we investigated the association of GSTP1 SNPs (rs1695-A/G and rs1138272-C/T) with LC in Iraqi males who smoke WP. Here, we expanded our analysis to include GSTM1 (active/null) and GSTT1 (active/null) genotypes, both individually and in combination with GSTP1 SNPs. Multiplex PCR and RFLP-PCR assays were utilized to determine the genotypes of 123 cases and 129 controls. No significant association was observed between GSTM1-null or GSTT1-null genotypes and LC risk, either separately or in combination with variant genotypes of GSTP1 (rs1695 "AG+GG" and rs1138272 "CT+TT"). However, smoking WP and carrying null genotypes elevated the risk five-fold for GSTM1-null (OR 5.17, 95 % CI 2.02–13.24, P<0.001) and three-fold for GSTT1-null (OR 3.08, 95 % CI 1.55–6.13, P=0.001) compared to non-smokers carrying active genotypes. Conversely, genotype distribution analysis based on LC histological types did not indicate an increased risk of LC. Lung cancer is a complex multifactorial disease. WP smoking and GSTs genetic polymorphisms might be associated with an increased risk of developing LC. However, our data did not confirm an association between GST polymorphisms alone and the risk of LC.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreCancer is in general not a result of an abnormality of a single gene but a consequence of changes in many genes, it is therefore of great importance to understand the roles of different oncogenic and tumor suppressor pathways in tumorigenesis. In recent years, there have been many computational models developed to study the genetic alterations of different pathways in the evolutionary process of cancer. However, most of the methods are knowledge-based enrichment analyses and inflexible to analyze user-defined pathways or gene sets. In this paper, we develop a nonparametric and data-driven approach to testing for the dynamic changes of pathways over the cancer progression. Our method is based on an expansion and refinement of the pathway bei
... Show MoreBackground: In December 2019, an episode of COVID-19 caused by severe acute respiratory syndrome coronavirus 2 (SARSCoV2) was reported in Wuhan, China and has spread around the world, increasing the number of contagions. Cytomegalovirus (CMV) and Epstein-Barr virus (EBV) are common herpesviruses that can cause persistent latent infections and affect the developing immune system.The study was conducted to explore the prevalence and reactivation of CMV and EBV antibodies in COVID-19 patients group in comparison to healthy group and to investigate the association between the presence of these viruses with each of severity of disease and oral hygiene. Materials and Methods: Eighty Five subjects were participated in this case control study (5
... Show MoreResveratrol, (RES), a phytoalexin, is well-known for its anti-inflammatory and anti-oxidant properties. SEB, a superantigen, is known to trigger ALI and cause mortality. In the current study, we tested the effect of RES in a dual-dose model of SEB exposure that triggers ALI and causes 100% mortality in C3H/HeJ-mice. The data revealed RES attenuated SEB-induced ALI and prevented mortality. Forty eight hours post-SEB exposure, lung-infiltrating mononuclear cells were tested for microRNA expression profile to determine the epigenetic regulation by resveratrol. SEB-activated splenocytes were pre-treated with 50 μM of RES or vehicle for metabolic profile analysis by measuring oxygen consu
Around fifty isolates of Salmonella enterica serovar Typhi were isolated from blood specimens of patients referring to several hospitals in Kirkuk province, Iraq. The results revealed that all isolates developed resistance to trimethoprim-sulfamethoxazole and chloramphenicol. However, neither sul2 nor tem genes were detected. Moreover, only ten isolates were positive for catP. Our data suggested participation of other genes or mechanisms allow these multidrug isolates to resist the antibiotics in question.
The issue of insurance against unlawful risks raises a jurisprudential and judicial debate between two opposing trends: the first considers coverage of these risks invalid due to their impact on public order or morals, while the second—which this research analyses—calls for the possibility of covering these risks in specific circumstances, based on contractual considerations in accordance with the principle that the contract is the law of the contracting parties, and based on the obligation to compensate the harmed third party—the victim—who has no connection to the unlawful act. In this context, our research highlights that contractual considerations can justify coverage of some unlawful risks, provided that the goal is to achieve
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreTen isolates were collected from different clinical sources from laboratory in medicine century . These isolates were belonging to the genus Salmonella depending on morphological and biochemical tests . The antibiotic scussptibility tests against 10 antibiotics were examined , and it was found that the 60% isolates have multiple resistant to antibiotic ,(70%) of isolates were resistant to ampicillin,(50%) were resistant to augmentin ,(40%) were resistant to ceftriaxone ,(20%) were resistant to cefotaxime and (10%) were resistant to ciprofloxacin and tetracycline while all isolates showed sensitivity to piperacillin, imipenem, amikacin and erythromycin .The ability of Salmonela isolates to produce ?-lactamase enzymes were tested usin
... Show More