Introduction and Aim: Cancers are a complex group of genetic illnesses that develop through multistep, mutagenic processes which can invade or spread throughout the body. Recent advances in cancer treatment involve oncolytic viruses to infect and destroy cancer cells. The Newcastle disease virus (NDV), an oncolytic virus has shown to have anti-cancer effects either directly by lysing cancer cells or indirectly by activating the immune system. The green fluorescent protein (GFP) has been widely used in studying the anti-tumor activity of oncolytic viruses. This study aimed to study the anticancer effect of a recombinant rNDV-GFP clone on NCI-H727 lung carcinoma cell line in vitro. Materials and Methods: The GFP gene was inserted to a NDV strain to create a recombinant NDV (rNDV- GFP) using reverse genetics technology. The MTT assay was used in evaluating the oncolytic effect of rNDV- GFP on the lung carcinoma NCI-H727 cells. Light and fluorescent microscopy was used to study the cytopathic effects of rNDV-GFP. Results: MTT assay showed that rNDV-GPF inhibited the NCI-H727 tumor cell death in a time-dependent manner. A significant inhibitory effect (78.3%) for rNDV-GPF on cancer cells was observed at 96h in comparison to rNDV (22.7%) and the cytotoxicity rate was directly proportional to the MOI used. Microscopic studies showed rNDV-GPF to induce cytopathic effect post 24 h of infection. Conclusion: The GFP-expressing recombinant NDV strains exhibited encouraging results in terms of tumor growth inhibition. Our research set the groundwork for employing recombinant NDV as an anticancer viral vector.
This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show MoreThe automatic liquid filling system is used in different applications such as production of detergents, liquid soaps, fruit juices, milk products, bottled water, etc. The automatic bottle filling system is highly expensive. Where, the common filling systems required to complex changes in hardware and software in order to modify volume of liquid. There are many important variables in the filling process such as volume of liquid, the filling time, etc. This paper presents a new approach to develop an automatic liquid filling system. The new proposed system consists of a conveyor subsystem, filling stations, and camera to detect the level of the liquid at any instant during the filling process. The camera can detect accurately the leve
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreTo damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. A suitable PSS model was selected considering the low frequencies oscillation in the inter-area mode based on conventional PSS and Fuzzy Logic Controller. Two types of (FIS) Mamdani and suggeno were considered in this paper. The software of the methods was executed using MATLAB R2015a package.
A new spectrophotometric method has been developed for the assay of olanzapine (OLN.) in pure and dosage forms. The method is based on the diazocoupling of (OLN.) with diazotized p-nitroaniline in alkaline medium to form a stable brown colored water-soluble azo dye with a maximum absorption at 405 nm. The variables that affect the completion of reaction have been carefully optimized. Beer’s law is obeyed over the concentration range of (0.5-45.0 μg.mL-1) with a molar absorptivity of 1.5777×104 L.mol-1.cm-1. The limit of detection was 0.3148 μg.mL-1 and Sandell’s sensitivity value was 0.0198 μg.cm-2. The propose
... Show MoreSingle mode-no core-single mode fiber structure with a section of tuned no-core fiber diameter to sense changes in relative humidity has been experimentally demonstrated. The sensor performance with tuned NCF diameter was investigated to maximize the evanescent fields. Different tuned diameters of of (100, 80, and 60)μm were obtained by chemical etching process based on hydrofluoric acid immersion. The highest wavelength sensitivity was obtained 184.57 pm/RH% in the RH range of 30% –100% when the no-core fiber diameter diameter was 60 μm and the sensor response was in real-time measurements
The aim of this paper, is to study different iteration algorithms types two steps called, modified SP, Ishikawa, Picard-S iteration and M-iteration, which is faster than of others by using like contraction mappings. On the other hand, the M-iteration is better than of modified SP, Ishikawa and Picard-S iterations. Also, we support our analytic proof with a numerical example.
This study was aimed to investigat integrated system for in vitro growth of paulownia plants by assessing the efficacy of chlorine dioxide (ClO2) as an alternative to autoclave in sterilizing culture medium. Therefore, this study was devised to compare autoclave sterilization at three different times (5, 10, and 15) minutes and three different concentrations of ClO2 (0, 0.4, 0,8, 1) mg/L. The results showed that, compared with (0.4) mg/L concentration, concentrations of (0.8 and 1) mg/L are more effective at sterilizing the culture medium. ClO2 sterilization improved individual single node growth more than autoclave sterilization. Since ClO2 is non-toxic, it could be used as a safe alternative to autoclave when propagating paulown
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023