Gastric cancer is one of the most common malignancies worldwide. Although the diagnosis and treatment of this disease have substantially improved in recent years, the five-year survival rate of gastric cancer is still low due to local recurrence and distant metastasis. An in-depth study of the molecular pathogenesis of gastric cancer and related prognostic markers will help improve the quality of life and prognosis of patients with this disease. The purpose of this study was to identify and verify key SNPs in genes with prognostic value for gastric cancer.SNP-related data from gastric cancer patients were obtained from The Cancer Genome Atlas (TCGA) database, and the functions and pathways of the mutated genes were analyzed using DAVID software. A protein-protein interaction (PPI) network was constructed using the STRING database and visualized by Cytoscape software, and molecular complex detection (MCODE) was used to screen the PPI network to extract important mutated genes. Ten hub genes were identified using cytoHubba, and the expression levels and the prognostic value of the central genes were determined by UALCAN and Kaplan-Meier Plotter. Finally, quantitative PCR and Western blotting were used to verify the expression of the hub genes in gastric cancer cells.From the database, 945 genes with mutations in more than 25 samples were identified. The PPI network had 360 nodes and 1616 edges. Finally, cytoHubba identified six key genes (TP53, HRAS, BRCA1, PIK3CA, AKT1, and SMARCA4), and their expression levels were closely related to the survival rate of gastric cancer patients.Our results indicate that TP53, HRAS, BRCA1, PIK3CA, AKT1, and SMARCA4 may be key genes for the development and prognosis of gastric cancer. Our research provides an important bioinformatics foundation and related theoretical foundation for further exploring the molecular pathogenesis of gastric cancer and evaluating the prognosis of patients.
Catalysts of TiO\-2 pillared bentonite and TiO 2 pillared kaolinite were prepared.After being calcined at 350 ℃ or 600 ℃,the specific surface area and acid strength of the catalysts were determined, and regioselectivities of chlorobenzene nitration on these catalysts were investigated.It was found that the specific surface area and acid strength of the catalysts increased owing to pillaring,and TiO 2 pillared bentonite by calcination for 4 h at 350 ℃ enhanced the para selectivity of chlorobenzene nitration with nitric acid as nitrating agent,the ortho/para isomer ratio being 0 27 in the product of mononitration.The catalyst could be re utilized up to four times with little decrease in activity.
A colour reaction of ion association complex of the germanium(Ⅳ) tungstate butylrhodamine B was studied in the presence of 0.08% polyrinyl alcohol (PVA) in 0.96?mol·L -1 —1.16?mol·L -1 sulfuric acid medium.The maximum absorbance of the ion association complex is at 580?nm.The apparent molar absorptivity is 2.16×10 6?L·mol -1 ·cm -1 .Beer's law is obeyeed in the range of 0—20?μg·L -1 .The ion association complex was stable for at least 48?h.The malar ratio of Ge to W to BRB in the ion assocition complex was established to be 1∶12∶4.The influence of 30 diverse ions was examined.Most common ions do not interfere.The method can be applied to the spectrophotometric determination of micro germanium in some ginseng with satisfactory results.
Real-Time anomaly detection is a highlighted topic of network security research in recent years. Based on statistics character of traffic in a large-scale network, the steady metrics that can estimated network behavior are found and a sampling measurement model is presented in this paper. According to the center limited theory and hypothesis test, a real-time detection model on anomaly behavior of network traffic is built. Finally, the network behavior metrics on the ratio between ICMP request packets and reply packets is defined and the ICMP scan attack in the CERNET network is monitored real timely. Method and idea of this model provide some directed sense for other network security detection research.
Download This Paper Open PDF in Browser Add Paper to My Library Share: Permalink Using these links will ensure access to this page indefinitely Copy URL Copy DOI
Flow sampling algorithms and data streaming algorithms have widely adopted the hashing algorithms to detect flow information at the high-speed links for the applications of the flow distribution, the number of flow, the heavy-tailed flow, and so on. Hashing algorithms involve transforming a key inside a hash value. The hashing algorithms used in high-speed networks have some specific properties: uniformity of distribution, computation speed. In this paper, we analyze the XOR operator in the hash-based flow selection function at the high-speed links, and prove that bit XOR operator can increase the uniformity of distribution. The hashing algorithms on the XOR operate are evaluated by mathematical analysis and trace-driven experiments on CERNET.
Taking private listed corporations as sample,this paper tests the hypotheses——debt financing can increase firms' market value.The result of this paper supports the conclusion that debt financing affects corporate governance and is positively related to firm's market value.This paper discloses that some improvements must be taken in debt financing of listed corporations by further analyzing,and proposes some suggestions on it.
The Linux platform is applied more and more widely in all kinds of fields, especially in backstage server end. In addition, the development of embedded Linux is forwarded. Behind all these applications, security, stability, simplicity and efficiency are the key features to success. Under Linux, the rules of system call achieve and consolidate these features. This paper emphasizes the rules of system calls, illustrates the specific method to design and achieve a new system call and provides an instance of a system call from user space. At the end, this paper gives a further discussion on the positive and negative aspects to achieve system call and summarizes the advantages and disadvantages to add system call.