Preferred Language
Articles
/
RxafdYoBVTCNdQwCb56j
Phytoestrogens directly inhibit TNF-α-induced bone resorption in RAW264.7 cells by suppressing c-fos-induced NFATc1 expression
...Show More Authors

TNF-α-induced osteoclastogenesis is central to post-menopausal and inflammatory bone loss, however, the effect of phytoestrogens on TNF-α-induced bone resorption has not been studied. The phytoestrogens genistein, daidzein, and coumestrol directly suppressed TNF-α-induced osteoclastogenesis and bone resorption. TRAP positive osteoclast formation and resorption area were significantly reduced by genistein (10(-7) M), daidzein (10(-5) M), and coumestrol (10(-7) M), which was prevented by the estrogen antagonist ICI 182,780. TRAP expression in mature TNF-α-induced osteoclasts was also significantly reduced by these phytoestrogen concentrations. In addition, in the presence of ICI 182,780 genistein and coumestrol (10(-5) -10(-6) M) augmented TNF-α-induced osteoclast formation and resorption. However, this effect was not observed in the absence of estrogen antagonist indicating that genistein's and coumestrol's ER-dependent anti-osteoclastic action normally negates this pro-osteoclastic effect. To determine the mechanism mediating the anti-osteoclastic action we examined the effect of genistein, coumestrol, and daidzein on caspase 3/7 activity, cell viability and expression of key genes regulating osteoclast differentiation and fusion. While anti-osteoclastic phytoestrogen concentrations had no effect on caspase 3/7 activity or cell viability they did significantly reduce TNF-α-induced c-fos and NFATc1 expression in an ER dependent manner and also inhibited NFATc1 nuclear translocation. Significant decreases in NFκB and DC-STAMP levels were also noted. Interestingly, constitutive c-fos expression prevented the anti-osteoclastic action of phytoestrogens on differentiation, resorption and NFATc1. This suggests that phytoestrogens suppress TNF-α-induced osteoclastogenesis via inhibition of c-fos-dependent NFATc1 expression. Our data provides further evidence that phytoestrogens have a potential role in the treatment of post-menopausal and inflammatory bone loss directly inhibiting TNF-α-induced resorption.

Scopus
View Publication
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 22 2019
Journal Name
Baghdad Science Journal
Estimation of Survival Function for Rayleigh Distribution by Ranking function:-
...Show More Authors

In this article, performing and deriving te probability density function for Rayleigh distribution is done by using ordinary least squares estimator method and Rank set estimator method. Then creating interval for scale parameter of Rayleigh distribution. Anew method using   is used for fuzzy scale parameter. After that creating the survival and hazard functions for two ranking functions are conducted to show which one is beast.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Prediction of consolidation due to dewatering by using MATLAB software
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Cutting of Fiber-Reinforced Plastics by a CW CO2 Laser
...Show More Authors

In this work, a CW CO2 laser was used for cutting samples of the fiber-reinforced
plastics (FRP) of three different types of reinforcing material; aramide, glass and carbon.
Cutting process was investigated throughout the variation of some parameters of cutting
process and their effects on cutting quality as well as the effect of an inert gas exist in the
interaction region and finally using a mechanical chopper in order to enhance the cutting
quality. Results obtained explained the possibility to perform laser cutting with high
quality in these materials by good control of the parameters and conditions of the process.

View Publication Preview PDF
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Estimating Parametersof Gumbel Distribution For Maximum Values By using Simulation
...Show More Authors

In this research estimated the parameters of Gumbel distribution Type 1 for Maximum values through the use of two estimation methods:- Moments (MoM) and Modification Moments(MM) Method. the Simulation used for comparison between each of the estimation methods to reach the best method to estimate the parameters where the simulation was to generate random data follow Gumbel distributiondepending on three models of the real values of the parameters for different sample sizes with samples of replicate (R=500).The results of the assessment were put in tables prepared for the purpose of comparison, which made depending on the mean squares error (MSE).

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Effect gold nanoparticles generated by cold plasma for mineral blood
...Show More Authors

In the present study, gold nanoparticles (AuNPs) were prepared using a simple low cost method synthesized cold plasma at different exposure time . The nanoparticles were characterized using UV-Visible spectra, X-ray diffraction (XRD). The prepared AuNPs showed surface Plasmon resonance centered at 530, 540,and 533 nm. The XRD pattern showed that the strong intense peaks indicate crystalline nature and face centered cubic structure of gold nanoparticles for all samples were prepared .The average crystallite size of the AuNPs was 20-40 nm. Morphology of the AuNPs were carried out using FESEM. Observations show that the AuNPs synthesized we well dispersed with and particle sizes ranging from 9 to 31 nm with spherical shapes which are cle

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Medical Research & Health Sciences
Non-Surgical Treatment of Gingival Recession by Platelet-Rich Plasma
...Show More Authors

Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Organic Electronics
Patterning organic transistors by dry-etching: The double layer lithography
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref