Preferred Language
Articles
/
NhZMxYsBVTCNdQwCgt6d
Effect of HPV infection on the expression of fibronectin in a group of Iraqi women with cervical carcinoma
...Show More Authors

: Cervical malignancy positioned as the fourth most prevalent disease among women around the world. HPVs especially HPV16 are the causative agent of cervical cancer, responsible of about 5% of all human cancers worldwide. Some researchers found that the fibronectin is repressed by the papillomavirus (HPV) type 16 E7 oncoprotein in both HPV-positive nontumorigenic and tumorigenic cell lines, while others found that the HPV oncoprotein increase the levels of fibronectin. The aim is to study the effect of HPV infection on Fibronectin expression and their correlation onthe development of Cervicalcancinoma. The current retrospective study enrolled paraffinized blocks of two groups. The research included 30 cervical carcinomatous tissues as well as 15 biopsies from an apparently normal cervical tissues. Each 4 mm – thick sections of the requested tissue block was stuck on a positive charged slide to be used for an immunohistochemical (IHC) technique for detecting HPV16 and fibronectin using monoclonal primary antibodies against them. The result revealed that there is nonsignificant correlation in the cervical cancer tissues when compared with normal cervical tissues (p = 0.2847)

Scopus
Publication Date
Sat Jul 01 2017
Journal Name
Italian Journal Of Pure And Applied Mathematics
A NOTE ON STRONGLY FULLY STABLE BANACH ALGEBRA MODULES RELATIVE TO AN IDEAL
...Show More Authors

Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.

Scopus
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Die Wirkungen der Nachkriegsliteraur Die Kurzgeschichte " Das Brot" von Wolfgang Borchert als Beispiel Eine analytische Studie The effect of post-war literature / short story ( The Bread )
...Show More Authors

Die Zusammenfassung :

In der  Forschung „ Die Wirkungen der  Nachkriegliteratur „ findet man einen Überblick über die Wirkungen der Literatur im Allgemeinen und besonders über die Wirkungen der Nachkriegliteratur in Deutschland. Das Kurzgeschichte „ das Brot“ von Wolfgang Borchert „  wird in dieser Forschung als Beispiel analysiuert, weil sie die Nachteile des Kriegs und ihre Wirkungen auf die Familienbeziehungen behandelt. Die Hauptfiguren der Kurzgeschichte sind ein alter Mann und seine Frau. Der Schriftsteller bestimmt die Rolle der Frauen in Deutschland. Die Frau in dieser Geschichte ist stärker als ihren Mann , denn er war lügner und schwach.

Post-war Literature has an e

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 17 2025
Journal Name
Journal Of Physical Education
The effect of dynamic lactic training according to the target time fo developing special endurance, lactic acid concentration, and achievement for 800m runners under20 years old
...Show More Authors

View Publication