Cancer is in general not a result of an abnormality of a single gene but a consequence of changes in many genes, it is therefore of great importance to understand the roles of different oncogenic and tumor suppressor pathways in tumorigenesis. In recent years, there have been many computational models developed to study the genetic alterations of different pathways in the evolutionary process of cancer. However, most of the methods are knowledge-based enrichment analyses and inflexible to analyze user-defined pathways or gene sets. In this paper, we develop a nonparametric and data-driven approach to testing for the dynamic changes of pathways over the cancer progression. Our method is based on an expansion and refinement of the pathway being studied, followed by a graph-based multivariate test, which is very easy to implement in practice. The new test is applied to the rich Cancer Genome Atlas data to study the (epi)genetic alterations of 186 KEGG pathways in the development of serous ovarian cancer. To make use of the comprehensive data, we incorporate three data types in the analysis representing gene expression level, copy number and DNA methylation level. Our analysis suggests a list of nine pathways that are closely associated with serous ovarian cancer progression, including cell cycle, ERBB, JAK-STAT signaling and p53 signaling pathways. By pairwise tests, we found that most of the identified pathways contribute only to a particular transition step. For instance, the cell cycle and ERBB pathways play key roles in the early-stage transition, while the ECM receptor and apoptosis pathways contribute to the progression from stage III to stage IV. The proposed computational pipeline is powerful in detecting important pathways and gene sets that drive cancers at certain stage(s). It offers new insights into the understanding of molecular mechanism of cancer initiation and progression. © 2020 Elsevier Ltd
A group of acceptance sampling to testing the products was designed when the life time of an item follows a log-logistics distribution. The minimum number of groups (k) required for a given group size and acceptance number is determined when various values of Consumer’s Risk and test termination time are specified. All the results about these sampling plan and probability of acceptance were explained with tables.
Natural fractures provide an important reservoir space and migration channels for oil and gas reservoirs and control the reservoir potential. Therefore, it is essential to understand the methods for identifying accurate reservoir permeability and characterizing reservoir fractures. In particular, using conventional measurements to identify permeability and characterize fractures is very expensive. While using conventional logging data is very challenging, and an efficient characterization correlation method is urgently needed. In this paper, we have evaluated reservoir potential based on the sensitivity of sonic scanner tools to fluid mobility, maximum stress direction, and fractures presence. This tool provides a continuous estimat
... Show MoreOne of the most popular causes for implant infection is dental plaque bacteria. Previous studies have shown the bactericidal effect of CO2 laser irradiation on bacteria associated with soft tissue surrounding the implant materials. No published studies have examined the effect of irradiation by CO2 laser on Streptococcus oralis and Staphylococcus aureus.The aim of this study was to evaluate the bactericidal effect of CO2 laser on bacteria that are causing dental implant infections. This study was carried out on two isolates of bacterial species out of 25 samples, isolated from patients having soft tissue infections around the dental implant. These two pure isolates including Streptococcus oralis and Staphylococcus aureus were identified
... Show MoreIn this study Candida speices was diagnosed in 26 swab samples from patients with denture stomatitis , investigates the antagonism activity of Lactobacillus was investigated against the yeast of Candida albicans in vitro.Results revealed that The inhibition effect of Lactic Acid Bacteria against C.albicans was examined in solid medium, L.plantarum gave higher inhibition average 11mm followed by L.acidophillus with average 9 mm and, L.fermentum , L.casei with averages 7 mm. Whereas the filtrates, the highest inhibition zone were 20 and 16 mm by L. plantarum and L.acidophillus, respectively.
Recent studies have revealed some conflicting results about the health effects of caffeine. These studies are inconsistent in terms of design and population and source of consumed caffeine. In the current study, we aimed to evaluate the possible health effects of dietary caffeine intake among overweight and obese individuals.
In this cross-sectional study, 488 apparently healthy individuals with overweight and obesity were participated. Dietary intake was assessed by a Food Frequency Questionnaire (FFQ) and
In this work, an optical fiber biomedical sensor for detecting the ratio of the hemoglobin in the blood is presented. A surface plasmon resonance (SPR)-based coreless optical fiber was developed and implemented using single- and multi-mode optical fibers. The sensor is also utilized to evaluate refractive indices and concentrations of hemoglobin in blood samples, with 40 nm thickness of (20 nm Au and 20 nm Ag) to increase the sensitivity. It is found in practice that when the sensitive refractive index increases, the resonant wavelength increases due to the decrease in energy.
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More