Preferred Language
Articles
/
ShjxC5YBVTCNdQwCv4Fc
Cytotoxic effect of cloned EGFP gene on NCI-H727 cell line via genetically engineered gene transfer system
...Show More Authors

Introduction and Aim: Cancers are a complex group of genetic illnesses that develop through multistep, mutagenic processes which can invade or spread throughout the body. Recent advances in cancer treatment involve oncolytic viruses to infect and destroy cancer cells. The Newcastle disease virus (NDV), an oncolytic virus has shown to have anti-cancer effects either directly by lysing cancer cells or indirectly by activating the immune system. The green fluorescent protein (GFP) has been widely used in studying the anti-tumor activity of oncolytic viruses. This study aimed to study the anticancer effect of a recombinant rNDV-GFP clone on NCI-H727 lung carcinoma cell line in vitro.   Materials and Methods: The GFP gene was inserted to a NDV strain to create a recombinant NDV (rNDV- GFP) using reverse genetics technology. The MTT assay was used in evaluating the oncolytic effect of rNDV- GFP on the lung carcinoma NCI-H727 cells. Light and fluorescent microscopy was used to study the cytopathic effects of rNDV-GFP.   Results: MTT assay showed that rNDV-GPF inhibited the NCI-H727 tumor cell death in a time-dependent manner. A significant inhibitory effect (78.3%) for rNDV-GPF on cancer cells was observed at 96h in comparison to rNDV (22.7%) and the cytotoxicity rate was directly proportional to the MOI used. Microscopic studies showed rNDV-GPF to induce cytopathic effect post 24 h of infection.   Conclusion: The GFP-expressing recombinant NDV strains exhibited encouraging results in terms of tumor growth inhibition. Our research set the groundwork for employing recombinant NDV as an anticancer viral vector.  

Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Tourism Companies Assessment via Social Media Using Sentiment Analysis
...Show More Authors

In recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Pure And Applied Mathematics Journal
Memory Effects in Diffusion Like Equation Via Haar Wavelets
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceeding Of The 1st International Conference On Advanced Research In Pure And Applied Science (icarpas2021): Third Annual Conference Of Al-muthanna University/college Of Science
Approximation fixed point theorems via generalized like contraction mappings
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
On Bayesian Estimation of System Reliability in Stress – Strength Model Based on Generalized Inverse Rayleigh Distribution
...Show More Authors
Abstract<p>The parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.</p>
View Publication
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 04 2015
Journal Name
Asian Journal Of Applied Science And Engineering
Fabrication and Characterization of Au/Si Heterojunction Solar Cell
...Show More Authors

The n-type Au thin films of 500nm thickness was evaporated by thermal evaporation method on p-type silicon wafer of [111] direction to formed Au/Si heterojunction solar cell. The AC conductivity, C-V and I-V characteristics of fabricated c-Au/Si diffusion heterojunction-(HJ) solar cell, has been studied. The first methods demonstrated that the AC conductivity due to with diffusiontunneling mechanism, while the second show that, the heterojunction profile is abrupt, the heterojunction parameters have been played out, such as the depletion width, built-in voltage, and concentration. And finally the third one show that the c-Au/Si HJ has rectification properties, and the solar cell yielded an open circuit voltage of (Vic) 0.4V, short circuit c

... Show More
Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Investigating the Performance of Rechargeable Zinc-Air Fuel Cell
...Show More Authors

   Zinc-air fuel cells (ZAFCs) are a promising energy source that could compete with lithium-ion batteries and perhaps proton-exchange membrane fuel cells (PEMFCs) for next-generation electrified transportation and energy storage applications. In the present work, a flow-type ZAFC with mechanical rechargeable was adopted, combined with an auxiliary cell (electrolyzer) for zinc renewal and electrolyte recharge to the main cell. In this work a practical study was performed to calculate the cell capacity (Ah), as well as study the electrolysis cell efficiency by current efficiency, and study the effective parameters that have an influence on cell performance such as space velocity and current density. The best parameters were selected to

... Show More
View Publication Preview PDF
Crossref