يعتبر "تاج الأشواك" أو نبات شوكة المسيح، وهو من نباتات الزينة الطبية ، ينتمي إلى جنس يوفوربيا. E. milii يحتوي كميات وفيرة من المركبات الفينولية ، التربينات، الستيرويدات والقلويدات. كانت الأهداف الرئيسية لهذه الدراسة هي فحص مستخلصات الفلافونويد والنانو فلافونويد ضد نوعين من خطوط الخلايا السرطانية. تم تصنيع مركبات الفلافونويد النانوية عن طريق تفاعل مركب الكيتوسان والماليك اسد. تم تحليل مركبات الفلافونويد النانوية بواسطة مقياس الطيف الضوئي UV-sp -8001 بطول موجي 200-1000 نانومتر ، تم استخدام المجهر الإلكتروني (TEM) والمجهري الإلكتروني الماسح(SEM) لتحديد الخصائص المورفولوجية لمركبات الفلافونويد النانوية. يعتبر الفلافونويد والنانوفلافونويدعقار قوي ومتطور ضد خلايا سرطان الثدي (MCF-7) وخلايا سرطان البروستات(PC3) . تم فحص الفعالية المضادة للسرطان من مركبات الفلافونويد والنانوفلافونويد على خطين مختلفين من الخلايا السرطانية وكذلك خطوط الخلايا السليمة باستخدام اختبار MTT. تم استخدام تجزئة الحمض النووي وتقنية تلوين الخلايا بالصبغة المزدوجة AO / EtBr لفحص علامات موت الخلايا المبرمج. لتحديد تشتت دورة الخلية ، تم استخدام قياس التدفق الخلوي ، وأظهرت النتائج أن كميات الفلافونويد والنانوفلافونويد لها نشاطا ساما وفعالا ضد خطوط خلايا سرطان الثدي والبروستات. بالإضافة إلى ذلك ، تم ربط إيقاف دورة الخلية في مرحلة G0 / G1 بموت الخلايا المبرمج لخطوط الخلايا التي يسببها الفلافونويد والنانوفلافونويد. وفقًا لهذه النتائج ، تمنع مركبات الفلافونويد والنانوفلافونويد من تكاثر خطوط الخلايا السرطانية ، مما يؤدي إلى توقف دورة الخلية وتحفيز موت الخلايا المبرمج. تشير النتائج المتاحة إلى أن مركب الفلافونويد والنانوفلافونويد سيمثل نهجًا علاجيًا واعدًا لعلاج الخلايا السرطانية من الأنواع الأخرى.
A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show More