期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
lncRNA717对胃癌细胞生物学行为的影响及调控机制研究
1
作者 周善学 陆蓉丹 +5 位作者 朱春霞 邵永富 倪超 余筱燕 严嘉宁 郑四鸣 《浙江医学》 CAS 2023年第14期1505-1511,I0006,I0007,共9页
目的探讨长链非编码RNA(lncRNA)717对胃癌细胞增殖、转移等生物学行为的影响及其调控机制。方法收集2021年1至12月宁波大学附属第一医院手术切除或活检的31例胃癌组织及配对癌旁组织,以及胃癌细胞系AGS、HGC-27和人正常胃黏膜细胞系GES-... 目的探讨长链非编码RNA(lncRNA)717对胃癌细胞增殖、转移等生物学行为的影响及其调控机制。方法收集2021年1至12月宁波大学附属第一医院手术切除或活检的31例胃癌组织及配对癌旁组织,以及胃癌细胞系AGS、HGC-27和人正常胃黏膜细胞系GES-1。采用qRT-PCR法检测lncRNA717在胃癌组织及癌旁组织、各细胞系中的表达水平。采用细胞增殖和毒性检测(CCK-8)法、Transwell法和划痕试验分别评估lncRNA717对细胞增殖、侵袭和迁移中的影响。采用荧光素酶报告基因测定、qRT-PCR法和Western blot法检测各组标本和细胞中lncRNA717、miR-762和干扰素调节因子(IRF)7表达水平。结果与癌旁组织相比,lncRNA717在胃癌组织中显著下调,与正常细胞相比,lncRNA717在胃癌细胞中显著下调。过表达lncRNA717抑制了胃癌细胞的增殖、迁移和侵袭。lncRNA717可以吸附miR-762,上调miR-762能抑制IRF7的表达,促进胃癌细胞的增殖、迁移和侵袭,而过表达lncRNA717后逆转了miR-762对细胞的增殖、迁移和侵袭的促进作用。结论lncRNA717可抑制胃癌细胞的增殖和转移,这可能与调控miR-762/IRF7有关。提示lncRNA717可作为胃癌的潜在生物标志物和治疗靶点。 展开更多
关键词 胃癌 长链非编码RNA miR-762 干扰素调节因子7
下载PDF
PCDH17基因甲基化检测对胃癌早期诊断的价值研究 被引量:2
2
作者 朱春霞 周善学 +1 位作者 胡桂梅 叶国良 《浙江医学》 CAS 2019年第9期876-880,共5页
目的探讨原钙黏附蛋白17(PCDH17)基因甲基化与胃癌的关系及其在胃癌诊断中的价值。方法采用荧光定量甲基化特异性PCR法分析正常胃黏膜上皮细胞株GES-1和胃癌细胞株MGC-803、AGS和SGC-7901,120对胃癌组织及对应癌旁正常组织,120例胃癌患... 目的探讨原钙黏附蛋白17(PCDH17)基因甲基化与胃癌的关系及其在胃癌诊断中的价值。方法采用荧光定量甲基化特异性PCR法分析正常胃黏膜上皮细胞株GES-1和胃癌细胞株MGC-803、AGS和SGC-7901,120对胃癌组织及对应癌旁正常组织,120例胃癌患者血浆样本和120例健康体检者血浆样本中PCDH17基因甲基化水平;并分析胃癌组织中PCDH17基因甲基化水平与临床病理特征的关系。比较胃癌组织和血浆样本中PCDH17基因甲基化的诊断效能,评估PCDH17基因甲基化在胃癌诊断中的价值。结果 3株胃癌细胞PCDH17基因甲基化水平均明显高于正常胃黏膜上皮细胞,差异均有统计学意义(均P<0.01)。胃癌组织中PCDH17基因甲基化水平明显高于对应癌旁正常组织,差异有统计学意义(P<0.01)。胃癌组织中PCDH17基因甲基化水平与糖类抗原19-9表达情况、淋巴管侵犯、神经侵犯、淋巴结转移和Stage分期均有关(均P<0.05)。胃癌患者血浆样本中PCDH17基因甲基化水平明显高于健康体检者,差异有统计学意义(P<0.01)。在胃癌组织中,PCDH17基因甲基化水平用于诊断胃癌的AUC为0.73,灵敏度为0.58,特异度为0.80。在血浆样本中,PCDH17基因甲基化水平用于诊断胃癌的AUC为0.77,灵敏度为0.63,特异度为0.83。结论 PCDH17基因甲基化在胃癌发生、发展过程中发挥重要作用。PCDH17基因甲基化水平可作为胃癌的早期无创筛查的生物标志物。 展开更多
关键词 胃癌 甲基化 原钙黏附蛋白17 诊断 分子诊断标志物
下载PDF
WAVELET TRANSFORM THRESHOLD NOISE REDUCTION METHODS IN THE OIL PIPELINE LEAKAGE MONITORING AND POSITIONING SYSTEM 被引量:3
3
作者 Gao Chao zhou shanxue 《Journal of Electronics(China)》 2010年第3期405-411,共7页
This letter investigates the wavelet transform, as well as the principle and the method of the noise reduction based on wavelet transform, it chooses the threshold noise reduction, and discusses in detail the principl... This letter investigates the wavelet transform, as well as the principle and the method of the noise reduction based on wavelet transform, it chooses the threshold noise reduction, and discusses in detail the principles, features and design steps of the threshold method. Rigrsure, heursure, sqtwolog and minimization four kinds of threshold selection method are compared qualitatively, and quantitatively. The wavelet analysis toolbox of MATLAB helps to realize the computer simulation of the signal noise reduction. The graphics and calculated standard deviation of the various threshold noise reductions show that, when dealing with the actual pressure signal of the oil pipeline leakage, sqtwolog threshold selection method can effectively remove the noise. Aiming to the pressure signal of the oil pipeline leakage, the best choice is the wavelet threshold noise reduction with sqtwolog threshold. The leakage point is close to the actual position, with the relative error of less than 1%. 展开更多
关键词 Wavelet transform Decreasing-noise THRESHOLD Oil pipeline leakage MATLAB
下载PDF
A NOVEL RESEARCH OF CONFIDENTIAL COMMUNICATION BASED ON THE ELLIPTIC CURVE AND THE COMBINED CHAOTIC MAPPING
4
作者 Gao Chao Liang Dongying zhou shanxue 《Journal of Electronics(China)》 2009年第5期706-710,共5页
This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for ... This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for the key distribution. After the linear transformation, the original chaotic sequence generated by drive system will be combined to chaotic mapping, converted to an encryption key sequence and constructed as Hash table for message authentication. The communication experiment used in the letter proves that the combination of combined chaotic encryption and conventional encryption is safe, feasible, and easy to implement by software. 展开更多
关键词 CHAOS Hash algorithm Elliptic curve Chaotic map
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部