يعتبر "تاج الأشواك" أو نبات شوكة المسيح، وهو من نباتات الزينة الطبية ، ينتمي إلى جنس يوفوربيا. E. milii يحتوي كميات وفيرة من المركبات الفينولية ، التربينات، الستيرويدات والقلويدات. كانت الأهداف الرئيسية لهذه الدراسة هي فحص مستخلصات الفلافونويد والنانو فلافونويد ضد نوعين من خطوط الخلايا السرطانية. تم تصنيع مركبات الفلافونويد النانوية عن طريق تفاعل مركب الكيتوسان والماليك اسد. تم تحليل مركبات الفلافونويد النانوية بواسطة مقياس الطيف الضوئي UV-sp -8001 بطول موجي 200-1000 نانومتر ، تم استخدام المجهر الإلكتروني (TEM) والمجهري الإلكتروني الماسح(SEM) لتحديد الخصائص المورفولوجية لمركبات الفلافونويد النانوية. يعتبر الفلافونويد والنانوفلافونويدعقار قوي ومتطور ضد خلايا سرطان الثدي (MCF-7) وخلايا سرطان البروستات(PC3) . تم فحص الفعالية المضادة للسرطان من مركبات الفلافونويد والنانوفلافونويد على خطين مختلفين من الخلايا السرطانية وكذلك خطوط الخلايا السليمة باستخدام اختبار MTT. تم استخدام تجزئة الحمض النووي وتقنية تلوين الخلايا بالصبغة المزدوجة AO / EtBr لفحص علامات موت الخلايا المبرمج. لتحديد تشتت دورة الخلية ، تم استخدام قياس التدفق الخلوي ، وأظهرت النتائج أن كميات الفلافونويد والنانوفلافونويد لها نشاطا ساما وفعالا ضد خطوط خلايا سرطان الثدي والبروستات. بالإضافة إلى ذلك ، تم ربط إيقاف دورة الخلية في مرحلة G0 / G1 بموت الخلايا المبرمج لخطوط الخلايا التي يسببها الفلافونويد والنانوفلافونويد. وفقًا لهذه النتائج ، تمنع مركبات الفلافونويد والنانوفلافونويد من تكاثر خطوط الخلايا السرطانية ، مما يؤدي إلى توقف دورة الخلية وتحفيز موت الخلايا المبرمج. تشير النتائج المتاحة إلى أن مركب الفلافونويد والنانوفلافونويد سيمثل نهجًا علاجيًا واعدًا لعلاج الخلايا السرطانية من الأنواع الأخرى.
This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreAutorías: Hadeer Idan Ghanim, Ishraq Mahmood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 3, 2021. Artículo de Revista en Dialnet.
This study was perform to defined the effect of fungus Metarhizium anisopliae Sorokin with concentrations 5x101, 5x103 and 5x105 spore/ ml and Actelic insecticide with concentration 0.001% in pupa stages of Callosobruchus maculatus in pupa ages of 24 and 120 hours the results of the study showed the following: the highest killing rate of treated pupa in age 120 hours 100% at concentration 105 spore/ ml. observation for distortions in the adult insects from the pupa that treated with fungal concentration like wings and abdominal distortion , the concentration of fungal effect on the number of eggs that production from adults and percentage of hatching.
Tumor necrosis factor-alpha (TNF-α) antagonists’ therapy are expensive and has a non-responsive rate between 30% to 40% in rheumatoid arthritis patients. Genetic variation plays a vital role in the responsiveness to this type of therapy.The aim of this study is to investigate if the presence of genetic polymorphism in the TNF-α gene promoter region at locations -376 G/A (rs1800750), -806 C/T (rs4248158), and -1031 T/C (rs1799964) affects rheumatoid arthritis patient's tendency to be a non-responder to etanercept.
Eighty RA patients on etanercept (ETN) for at least six months were recruited from the Rheumatology Unit at Baghdad Teaching Hospital. Based on The European League Against Rheumatism response (EULAR) criteria, patient
... Show More