RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기
      • 무료
      • 기관 내 무료
      • 유료
      • Assessment of the Prognostic Value of Methylation Status and Expression Levels of FHIT, GSTP1 and p16 in Non-Small Cell Lung Cancer in Egyptian Patients

        Haroun, Riham Abdel-Hamid,Zakhary, Nadia Iskandar,Mohamed, Mohamed Ragaa,Abdelrahman, Abdelrahman Mohamed,Kandil, Eman Ibrahim,Shalaby, Kamal Ali Asian Pacific Journal of Cancer Prevention 2014 Asian Pacific journal of cancer prevention Vol.15 No.10

        Background: Methylation of tumor suppressor genes has been investigated in all kinds of cancer. Tumor specific epigenetic alterations can be used as a molecular markers of malignancy, which can lead to better diagnosis, prognosis and therapy. Therefore, the aim of this study was to evaluate the association between gene hypermethylation and expression of fragile histidine triad (FHIT), glutathione S-transferase P1 (GSTP1) and p16 genes and various clinicopathologic characteristics in primary non-small cell lung carcinomas (NSCLC). Materials and Methods: The study included 28 primary non-small cell lung carcinomas, where an additional 28 tissue samples taken from apparently normal safety margin surrounding the tumors served as controls. Methylation-specific polymerase chain reaction (MSP) was performed to analyze the methylation status of FHIT, GSTP1 and p16 while their mRNA expression levels were measured using a real-time PCR assay with SYBR Green I. Results: The methylation frequencies of the genes tested in NSCLC specimens were 53.6% for FHIT, 25% for GSTP1, and 0% for p16, and the risk of FHIT hypermethylation increased among patients with NSCLC by 2.88, while the risk of GSTP1 hypermethylation increased by 2.33. Hypermethylation of FHIT gene showed a highly significant correlation with pathologic stage (p<0.01) and a significant correlation with smoking habit and FHIT mRNA expression level (p<0.05). In contrast, no correlation was observed between the methylation of GSTP1 or p16 and smoking habit or any other parameter investigated (p>0.05). Conclusions: Results of the present study suggest that methylation of FHIT is a useful biomarker of biologically aggressive disease in patients with NSCLC. FHIT methylation may play a role in lung cancer later metastatic stages while GSTP1 methylation may rather play a role in the early pathogenesis.

      • A Performance Comparison between XEN and KVM Hypervisors While Using Cryptographic Algorithms

        Mohammed Al-Shalabi,Waleed K. Abdulraheem,Jafar Ababneh,Nader Abdel Karim International Journal of Computer ScienceNetwork S 2024 International journal of computer science and netw Vol.24 No.1

        Cloud Computing is internet-based computing, where the users are provided with whatever service they need from the resources, software, and information. Recently, the security of cloud computing is considered as one of the major issues for both cloud service providers CSP and end-users. Privacy and highly confidential data make many users refuse to store their data within cloud computing, since data on cloud computing is not dully secured. The cryptographic algorithm is a technique which is used to maintain the security and privacy of the data on the cloud. In this research, we applied eight different cryptographic algorithms on Xen and KVM as hypervisors on cloud computing, to be able to measure and compare the performance of the two hypervisors. Response time and CPU utilization while encryption and decryption have been our aspects to measure the performance. In terms of response time and CPU utilization, results show that KVM is more efficient than Xen on average at 11.5% and 11% respectively. While TripleDES cryptographic algorithm shows a more efficient time response at Xen hypervisor than KVM.

      • KCI등재

        Transanal Tube Drainage as a Conservative Treatment for Anastomotic Leakage Following a Rectal Resection

        Mostafa Shalaby,Waleed Thabet,Oreste Buonomo,Nicola Di Lorenzo,Mosaad Morshed,Giuseppe Petrella,Mohamed Farid,Pierpaolo Sileri 대한대장항문학회 2018 Annals of Coloproctolgy Vol.34 No.6

        Purpose: We evaluate the role of transanal tube drainage (TD) as a conservative treatment for patients with anastomotic leakage (AL). Methods: Patients treated for AL who had undergone a low or an ultralow anterior resection with colorectal or coloanal anastomosis for the treatment of rectal cancer between January 2013 and January 2017 were enrolled in this study. The data were collected prospectively and analyzed retrospectively. The primary outcomes were the diagnosis and the management of AL. Results: Two hundred thirteen consecutive patients, 122 males and 91 females, were included. The mean age was 66.91 ± 11.15 years, and the median body mass index was 24 kg/m2 (range, 20–35 kg/m2). The median tumor distance from the anal verge was 8 cm (range, 4–12 cm). Ninety-three patients (44%) received neoadjuvant therapy for nodal disease and/or locally advanced rectal cancer. Only 13 patients (6%) developed AL. Six patients developed subclinical AL as they had a defunctioning ileostomy at the time of the initial procedure. They were treated conservatively with TD under endoscopic guidance in the endoscopy unit and received intravenous antibiotics. Six weeks after discharge, these 6 patients underwent follow-up flexible sigmoidoscopy which showed a completely healed anastomotic defect with no residual stenosis. Seven patients developed a clinically significant AL and required reoperation with pelvic abscess drainage and Hartmann colostomy formation. Conclusion: These results suggest that TD for management of patients with AL is safe, cheap, and effective. Salvaging the anastomosis will help decrease the need for Hartmann colostomy formation. Proper patient selection is important.

      • A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

        Bawaneh, Mohammed J.,Al-Shalabi, Emad Fawzi,Al-Hazaimeh, Obaida M. International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.1

        The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

      • KCI등재

        An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping

        ( Ayman Al Dmour ),( Mohammed Abuhelaleh ),( Ahmed Musa ),( Hasan Al Shalabi ) 한국정보처리학회 2016 Journal of information processing systems Vol.12 No.2

        Image compression is an essential technique for saving time and storage space for the gigantic amount of data generated by images. This paper introduces an adaptive source-mapping scheme that greatly improves bitlevel lossless grayscale image compression. In the proposed mapping scheme, the frequency of occurrence of each symbol in the original image is computed. According to their corresponding frequencies, these symbols are sorted in descending order. Based on this order, each symbol is replaced by an 8-bit weighted fixed-length code. This replacement will generate an equivalent binary source with an increased length of successive identical symbols (0s or 1s). Different experiments using Lempel-Ziv lossless image compression algorithms have been conducted on the generated binary source. Results show that the newly proposed mapping scheme achieves some dramatic improvements in regards to compression ratios.

      • SCOPUSKCI등재

        An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping

        Al-Dmour, Ayman,Abuhelaleh, Mohammed,Musa, Ahmed,Al-Shalabi, Hasan Korea Information Processing Society 2016 Journal of information processing systems Vol.12 No.2

        Image compression is an essential technique for saving time and storage space for the gigantic amount of data generated by images. This paper introduces an adaptive source-mapping scheme that greatly improves bit-level lossless grayscale image compression. In the proposed mapping scheme, the frequency of occurrence of each symbol in the original image is computed. According to their corresponding frequencies, these symbols are sorted in descending order. Based on this order, each symbol is replaced by an 8-bit weighted fixed-length code. This replacement will generate an equivalent binary source with an increased length of successive identical symbols (0s or 1s). Different experiments using Lempel-Ziv lossless image compression algorithms have been conducted on the generated binary source. Results show that the newly proposed mapping scheme achieves some dramatic improvements in regards to compression ratios.

      • Association of XRCC1 Gene Polymorphisms with Breast Cancer Susceptibility in Saudi Patients

        Al Mutairi, Fatima Masoud,Alanazi, Mohammed,Shalaby, Manal,Alabdulkarim, Huda A.,Pathan, Akbar Ali Khan,Parine, Narasimha Reddy Asian Pacific Journal of Cancer Prevention 2013 Asian Pacific journal of cancer prevention Vol.14 No.6

        Background: X-ray repair cross-complementing group 1 (XRCC1) plays a key role in the base excision repair pathway, as a scaffold protein that brings together proteins of the DNA repair complex. XRCC1 is reported to be a candidate influence on cancer risk. The aim of our present study was to assess the association of rs1799782 (Arg194Trp) and rs25487 (Arg399Gln) XRCC1 gene polymorphisms with breast cancer in the Saudi population. Materials and Methods: The two SNP's were analyzed in breast cancer patients and healthy control subjects. Genotypes were determined by TaqMan SNP genotype analysis technique and data were analyzed using Chi-square or t test and logistic regression analysis by SPSS16.0 software. Results and Conclusions: Results showed that rs1799782 significantly increased susceptibility to breast cancer with Arg/Trp, Arg/Trp+Trp/Trp genotypes and at Trp allele overall study. It also increased risk of breast cancer in older age patients (above 48) and with the ER positive category. XRCC1rs25487 (Arg399Gln) did not showed any significant association. In conclusion the XRCC1rs1799782 polymorphism may be involved in the etiology of breast cancer in the Saudi population. Confirmation of our findings in larger populations of different ethnicities is warranted.

      • KCI등재

        Log-based petrophysical analysis of Khatatba Formation in Shoushan Basin, North Western Desert, Egypt

        Liyana Nadiah Osli,Nur Yusrina Yakub,Mohamed Ragab Shalaby,Md. Aminul Islam 한국지질과학협의회 2018 Geosciences Journal Vol.22 No.6

        This paper aims to investigate the good reservoir quality and hydrocarbon potentiality of the Khatatba Formation, Qasr Field in the Shoushan Basin of the North Western Desert, Egypt by combining results from log-based petrophysical analysis, petrographic description and images from scanning electron microscope (SEM). Promising reservoir units are initially identified and evaluated through well log analysis of three wells in the field of study. Petrophysical results are then compared with petrographic and SEM images from rock samples to identify features that characterize the reservoir quality. Well log results show that Khatatba Formation in the study area has good sandstone reservoir intervals from depths ranging from 12848 ft to 13900 ft, with good effective porosity records of 13–15% and hydrocarbon saturations of greater than 83%. Petrographic analysis of these sandstone reservoir units indicate high concentrations of vacant pore spaces with good permeability that can be easily occupied by hydrocarbon. The availability of these pore spaces are attributed to pore-enhancing diagenetic features, mainly in the form of good primary porosity and dissolution. SEM images and EDX analysis confirmed the presence of hydrocarbon, therefore indicating a good hydrocarbon-storing potential for the Khatatba Formation sandstones.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼