Preferred Language
Articles
/
9BbnGYcBVTCNdQwCIzY3
A Resource Allocation Mechanism for Cloud Radio Access Network Based on Cell Differentiation and Integration Concept
...Show More Authors

Crossref
View Publication
Publication Date
Thu May 05 2022
Journal Name
Karbala International Journal Of Modern Science
Nigella sativa Methanol Extract Inhibits PC-3 Cell Line Colonization, Induced Apoptosis, and Modulated LC3-based Autophagy
...Show More Authors

Nigella sativa has various pharmacological properties and has been used throughout history for a variety of reasons. However, there is limited data about the effects of N. sativa (NS) on human cancer cells. This study aimed at observing the roles of methanolic extract of N. sativa on apoptosis and autophagy pathway in the Human PC3 (prostate cancer) cell line. The cell viability was checked by MTT assay. Clonogenic assay was performed to demonstrate clonogenicity and Western blot was used to check caspase-3, TIGAR, p53, and LC3 protein expression. The results demonstrated that PC3 cell proliferation was inhibited, caspase-3 and p53 protein expression was induced, and LC3 protein expression was modulated. The clonogenic assay showed that PC3

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Fabrication and Study of Nano catalysis for Alkaline Fuel Cell
...Show More Authors

Preview PDF
Scopus
Publication Date
Thu Jul 30 2020
Journal Name
Journal Of Sustainability Science And Management
THE DIFFERENTIATION IN WORK ENRICHMENT STRATEGIES AND ORGANIZATIONAL CREATIVITY FUNCTION: A PERSPECTIVE FROM THE LEADERS OF THE MINISTRY OF OIL IN IRAQ
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 24 2019
Journal Name
Al-kindy College Medical Journal
Role of MRI diffusion weighted imaging in differentiation between benign and malignant ovarian masses
...Show More Authors

Background: Characterization of the ovarian masses preoperatively is important to inform the surgeon about the possible management strategies. MRI may be of great help in identifying malignant lesion before surgery. Diffusion Weighted Imaging (DWI) is a sensitive method for changes in proton of water mobility caused by pathological alteration of tissue cellularity, cellular membrane integrity, extracellular space perfusion, and fluid viscosity.

Objective: to study the diagnostic accuracy of DWI in differentiation between benign and malignant ovarian masses.

Type of the study:Cross-sectional study.

Methods: this study included  53with complex

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
New Spectrophotometric Estimation and Cloud Point Extraction of Cefdinir
...Show More Authors

A sensitive spectrophotometric method was developed for the estimation of cefdinir (CFD), a cephalosporin species. This study involves two methods, and the first method includes the preparing of azo dye by the reaction of CFD diazonium salt with 4-Tert-Butylphenol (4-TBP) and 2-Naphthol (2-NPT) in alkaline medium, which shows colored dyes measured at λmax 490 and 535 nm, respectively. Beer's law was obeyed along the concentration range of (3-100) μg.ml-1. The limits of detection were 0.246, 0.447 μg.ml-1 and molar absorptivities were 0.6129×104, 0.3361×104 L.mol-1cm-1 for (CFD-4-TBP) and (CFD-2-NPT), respectively. The second method includes preconcentration for cefdinir dyes by using cloud point extraction in the presence of Triton

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Integration between Lean Production and sustainable value chain in light of the trend towards a sustainable circular economy
...Show More Authors

In a resource-limited world, there is an urgent need to develop new economic models, from the traditional unsustainable industrial model of product consumption and disposal, to a new model based on the concepts of sustainability in its comprehensive sense, the so-called circular economy, using fewer resources in manufacturing processes and changing practices in product disposal to waste, by removing its use, recycling and manufacturing to start another manufacturing process. In an era of intense competition in domestic and global markets, the importance of the circular economy is highlighted in its ability to strengthen the competitiveness of enterprises in those markets, by reducing the cost and increasing the quality of the pro

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref