Multiple myeloma is hematological disease produces many complications in the bone, kidney, neural and other complications. The study aims to measure serum biomolecules like fetuin-A and resistin and determined the possibility to use these biomarkers as disease predictor. blood samples were isolated from 58 patients and 24 sex and age-matched control, serum then isolated, and proper ELISA kit then used to a determined level of B2 microglobulin, resistin, and fetuin-A. The result demonstrated significant increase in B2 microglobulin, fetuin-A and resistin in patients compare to control (1.3470.714 vs. 0.9130.253), p = 0.000, (14.00310.352 vs. 9.2594.264), p= 0.005, (1.9673.595 vs. 0.6040.622), p = 0.009, respectively. These differences give the possibility to use these biomolecules as a predictor in multiple myeloma.
The bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show MoreKetoprofen has recently been proven to offer therapeutic potential in preventing cancers such as colorectal and lung tumors, as well as in treating neurological illnesses. The goal of this review is to show the methods that have been used for determining ketoprofen in pharmaceutical formulations. Precision product quality control is crucial to confirm the composition of the drugs in pharmaceutical use. Several analytical techniques, including chromatographic and spectroscopic methods, have been used for determining ketoprofen in different sample forms such as a tablet, capsule, ampoule, gel, and human plasma. The limit of detection of ketoprofen was 0.1 ng/ ml using liquid chromatography with tandem mass spectrometry, while it was 0
... Show MoreAn increasing interest is emerging in identifying natural products to overcome drug resistance in cancer patients. In this context, the present study was conducted to investigate the cytotoxic effects of neem plant (Azadirachta indica) oil in three different biological models (breast cancer cell lines, Allium cepa root tip, and mice vital organs). The cytotoxic potential of the neem oil was evaluated with two human cell lines (MCF7 and MDA-MB231) and an Allum cepa root tip bioassay. Histopathological analysis was conducted on the neem oil-treated and untreated control mice. The results revealed an anti-proliferative effect for neem oil on both estrogen receptor-positive (MCF7) and estrogen receptor-negative (MDA-MB231) breast cancer cell li
... Show MoreThis paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.
the electron correlation effect for inter-shell can be described by evaluating the fermi hole and partial fermi hole for Li atom comparing with Be+ and B+2 ions
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
AW Ali T, Journal of the Faculty of Medicine, 2016 - Cited by 1
The futuristic age requires progress in handwork or even sub-machine dependency and Brain-Computer Interface (BCI) provides the necessary BCI procession. As the article suggests, it is a pathway between the signals created by a human brain thinking and the computer, which can translate the signal transmitted into action. BCI-processed brain activity is typically measured using EEG. Throughout this article, further intend to provide an available and up-to-date review of EEG-based BCI, concentrating on its technical aspects. In specific, we present several essential neuroscience backgrounds that describe well how to build an EEG-based BCI, including evaluating which signal processing, software, and hardware techniques to use. Individu
... Show More