Search or add a thesis

Advanced Search (Beta)
Home > Cytogenetic and Molecular Analysis of Chronic Myeloid Leukemia at Hyderabad Sindh.

Cytogenetic and Molecular Analysis of Chronic Myeloid Leukemia at Hyderabad Sindh.

Thesis Info

Access Option

External Link

Author

Ujjan, Ikram Din

Program

PhD

Institute

Isra University

City

Hyderabad

Province

Sindh

Country

Pakistan

Thesis Completing Year

2015

Thesis Completion Status

Completed

Subject

Applied Sciences

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/2042/1/16120s.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676725809381

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


BACKGROUND: Leukemia is defined as a neoplastic proliferation of hematopoietic tissue of white blood cell precursors in bone marrow CML accounts for 20% of all leukemias in adult patients. One of the characteristic findings in CML subjects is the presence of the Philadelphia (Ph) chromosome and Bcr-Abl oncogene. Philadelphia (Ph) is the shortened chromosome 22, formed by reciprocal translocation between the long arms of chromosomes 9 and 22, t (9; 22). OBJECTIVES OF STUDY: — To determine the frequency of Philadelphia chromosome in CML. — To evaluate the standard and variant translocation in CML. — To determine frequency of other chromosomal abnormalities in Philadelphia +ve CML. — To detect bcr-abl gene rearrangement and to determine the frequency of the b2a2 and b3a2 transcripts in Philadelphia + CML by PCR. SUBJECTS AND METHODS: The study was conducted at the Department of Pathology, Liaquat University of Medical and Health Sciences, Jamshoro and Isra University Hospital, Hyderabad during May-to-September 2014. Bone marrow and peripheral blood samples from a total of 145 diagnosed cases of CML were collected. Cytogenetic analyses were performed using karyotyping as per the international system for human cytogenetic nomenclature guidelines. All karyotpic images were analyzed using the Cytovision software. In order to identify BCR-ABL transcripts, RT-PCR was performed. Statistical analysis of the data was done using SPSS-version-21.0. Results: Of the 145 samples, a total of 133 (91.7%) were positive for the Ph (Ph+) while 12 (8.2%) were negative for the Ph (Ph-). Of the 133 Ph+ samples, standard chromosome was noted in 121 (90.9%), simple variant in 9 (6.7%) and complex variants in 3 (2.2%) of the samples. All the Ph+ samples (n=133) showed BCR-ABL positivity. Of the 12 Ph- samples, a total of 7 (58.3%) were BCR-ABL-positive and 5 (41.6%) were BCR-ABL-negative. Various types of molecular abnormalities were noted in in responders and in non responders as shown in table below. Out of 11 patients, who responded on Glivec, 8 patients showed b3a2 transcripts abnormality while 3 cases had b2a3 abnormality. Both non-responders showed b2a2 + e 19a2 transcripts. CONCLUSION: Philadelphia frequency of 90.9%. Out of 133 Ph +ve all were bcr-abl +ve while out of 12 Ph-ve 7 were bcr-abl +ve while 5 were –ve. Cytogenetic and molecular analysis has become mandatory in order to make a correct diagnosis and predict/monitor response to newer molecular targeted treatment modalities. KEY WORDS: Philadelphia chromosome, BCR-ABL, Chronic Myeloid Leukemia, cytogenetic analyses, Sindhi population.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

کعبہ کی تعمیر نو

کعبہ کی تعمیر نو:
آپ ﷺ کی عمر مبارک پینتیس برس کی تھی جب قریش نے کعبہ کی تعمیر نو کا ارادہ کیا ۔ تعمیر نو کی ایک وجہ تو یہ تھی کہ ایک عورت کعبہ کو خوشبودار دھونی دے رہی تھی کہ آگ لگ گئی جس سے کافی نقصان ہوا ۔ دوسری یہ وجہ تھی کہ دیواروں میں شگاف پڑے ہوئے تھے ۔ وہ اس طرح کہ بند ٹوٹ گیا جو مکہ کو سیلاب سے بچانے کے لیے بنایا گیا تھا ۔ سیلاب کی وجہ سے صحن حرم پانی سے بھر گیا تھا ۔ پہلے کعبہ کی چاردیواری تھی مگر چھت نہیں تھی ۔ ان حالات میں از سر نو تعمیر کعبہ کا بیڑا اٹھایا گیا یہ بہت دلچسپ بات ہے کہ کسی غیر قوم کاقبضہ کر کے گرا دینے ، منہدم کرنے کا واقعہ خانہ کعبہ کے ساتھ پانچ ہزار سال سے نہیں ہوا تھا جیسا کہ ہیکل یروشلم کے ساتھ بارہا ایسے واقعات پے درپے ہوتے رہے اور یہ ایسا شرف ہے کہ دنیا کے کسی عبادت خانہ کو حاصل نہیں ۔ ( رحمت اللعالمین ۔۱۔۴۳)
دوران تعمیر حجر اسود کے نصب کرنے کا مرحلہ آیا تو اختلاف پیدا ہوا ، یکے یو سف ہزار خریداروالا معاملہ تھا یعنی ہر شخص کی خواہش تھی کہ وہ حجر اسود کو کعبۃ اللہ کی دیوار میں نصب کرے ، بالآخر ایک بزرگ کی بات پر اتفاق ہوا کہ کل جو شخص سب سے پہلے باب بنی شیبہ سے حرم میں داخل ہو اس کو حکم مان لو اور وہ جو فیصلہ کریں اس پر عمل کریں ۔ اس رائے کو بالاتفاق پسند کیا گیا اور اسی پر عمل درآمد کرنے کا فیصلہ ہوا ۔ اگلی صبح آنحضرت ﷺ سب سے پہلے باب بنی شیبہ سے حرم میں داخل ہوئے۔ آنے والوں نے آپ ﷺ کو...

The Pandemic Era Digital Economy: Youth Challenges in Social Media Marketing

The field of finance, fintech, and even finance companies like insurers has become part of the world of the internet. Indeed, the digital economy has now entered the areas of shipping, banking, agriculture and urban planning. This is characterized by the usage of technologies and the internet for various uses, including digitalization, of culture. Hence the improvements in the organizational and even marketing processes to the customer element level and numerous transactional regulatory structures is important and common in industries. Youth are also facing challenges in social network marketing, including reliance on technological development, safety and privacy issues, balanced personalization and privacy, marketing transparency, uneven Internet infrastructure in ASEAN Countries, and tight competition. This is an important aspect of the youth's efforts.

Secret Data Transmission Using Steganography

Cryptography, watermarking and steganography are among the rapidly emerging techniques pertaining to sustain, authenticate, and exhume the hidden data, especially when it is transmitted over a public network/channel. In cryptography, the message is executed and encrypted artistically that the intended message becomes incomprehensible. Whereas, water marking technique conceals the data in some cover file quite tactfully that the data engrossed in the host signal/ entity becomes imperceptible which is likely to be authenticated later on. Likewise, steganography approach veils the data in the cover signal indistinctly to deflect the interception of undesired user. The exchange of encompassed message by cryptographic system may create suspense for the intruder. But, contrary to it, in steganography the user is less attracted to the hidden information. Therefore, the harmonization of both of these technologies can produce invisible higher level of message protection. In this dissertation, the problem of imperceptibility, data rate and robustness is formulated and different approaches are proposed and investigated to solve it. In first approach, a novel technique to embed information into the audio signals is proposed. In this regard, the set of all possible values of amplitudes of audio signals are termed as “audio sample space”. An algorithm is proposed to subdivide this sample space into subspaces and the information was embedded into these subspaces. On the other hand, an algorithm for decoding on receiver side is also proposed. The algorithm has the capability to work on real time systems and provide sufficient security at commercial level. The amount of imperceptibility achieved is, quite a distinct viii benefit concerning perceptual evaluation of speech quality (PESQ). In second approach, an innovative steganography technique has been engineered named as weighted pattern matching (WPM) which is utilized to collaborate the lifting wavelet transform. The message bits are insert in the indistinguishable places that are picked from the coefficients of detail sub-bands by taking edge of the proposed WPM technique. WPM captures the correlation between the message data block and detail coefficients help us to configure the exact location that can contain the data block invisibly. The ultimate results of the experiment exhibit that the WPM technique enhances invisibility significantly in addition to lossless massage retrieval. In third approach, another sustained efficient, imperishable approach brimmed of heavy payload, named compressive weighted pattern matching (CWPM) has been invented and applied. CWPM technique has been born from the combination of compressive sensing (CS) with WPM. Use of CS provides the higher level of security and bigger payload by means of compression and encryption. CWPM holds the position where data block can be embedded on the basis of a weighted correlation. Our engineered techniques have been compared with the well-known steganography elaborated in literature review. The results ingenuity proves that all designed models are far better firm and ingratiating.