يعتبر "تاج الأشواك" أو نبات شوكة المسيح، وهو من نباتات الزينة الطبية ، ينتمي إلى جنس يوفوربيا. E. milii يحتوي كميات وفيرة من المركبات الفينولية ، التربينات، الستيرويدات والقلويدات. كانت الأهداف الرئيسية لهذه الدراسة هي فحص مستخلصات الفلافونويد والنانو فلافونويد ضد نوعين من خطوط الخلايا السرطانية. تم تصنيع مركبات الفلافونويد النانوية عن طريق تفاعل مركب الكيتوسان والماليك اسد. تم تحليل مركبات الفلافونويد النانوية بواسطة مقياس الطيف الضوئي UV-sp -8001 بطول موجي 200-1000 نانومتر ، تم استخدام المجهر الإلكتروني (TEM) والمجهري الإلكتروني الماسح(SEM) لتحديد الخصائص المورفولوجية لمركبات الفلافونويد النانوية. يعتبر الفلافونويد والنانوفلافونويدعقار قوي ومتطور ضد خلايا سرطان الثدي (MCF-7) وخلايا سرطان البروستات(PC3) . تم فحص الفعالية المضادة للسرطان من مركبات الفلافونويد والنانوفلافونويد على خطين مختلفين من الخلايا السرطانية وكذلك خطوط الخلايا السليمة باستخدام اختبار MTT. تم استخدام تجزئة الحمض النووي وتقنية تلوين الخلايا بالصبغة المزدوجة AO / EtBr لفحص علامات موت الخلايا المبرمج. لتحديد تشتت دورة الخلية ، تم استخدام قياس التدفق الخلوي ، وأظهرت النتائج أن كميات الفلافونويد والنانوفلافونويد لها نشاطا ساما وفعالا ضد خطوط خلايا سرطان الثدي والبروستات. بالإضافة إلى ذلك ، تم ربط إيقاف دورة الخلية في مرحلة G0 / G1 بموت الخلايا المبرمج لخطوط الخلايا التي يسببها الفلافونويد والنانوفلافونويد. وفقًا لهذه النتائج ، تمنع مركبات الفلافونويد والنانوفلافونويد من تكاثر خطوط الخلايا السرطانية ، مما يؤدي إلى توقف دورة الخلية وتحفيز موت الخلايا المبرمج. تشير النتائج المتاحة إلى أن مركب الفلافونويد والنانوفلافونويد سيمثل نهجًا علاجيًا واعدًا لعلاج الخلايا السرطانية من الأنواع الأخرى.
Cervical cancer is the third most common cancer in women worldwide, and it has the fourth highest mortality rate among cancers in women. The present study aimed to reveal the impact of age factor in cervical abnormalities and cancers incidence in some Iraqi married women. 150 scraping cervical cells samples were collected from the women clinically diagnosed with cervical abnormalities and cancer who were divided into two groups; the first group included the women with abnormal pap smear which revealed 13.33% of women were less than 30 years and followed by 66.66% of women whose age between 30-50 years and 20% of them were more than 50 years old. While the second group iclude the women with normal Pap smear (Healthy women) which revealed tha
... Show MoreAbstract
The issue of inequality in distribution of income and / or consumption expenditure is related to economic welfare because there is an inverse relationship between the economic welfare on the one hand, and the degree of inequality, on the other hand. Despite the fact that inequality is considered as normal phenomenon in every society, but if it exceeded certain limits it will lead to undesirable economic, social and political consequences. Therefore, the availability of indicators about inequality is a necessary tool for planning and evaluation of economic development programs. So, current study is aiming at measuring and analyzing the degree of inequality in distribution of consumpti
... Show MoreFollowing model educational offenders in collection and Alasbaka of fifth grade students preparatory in history A. M. Dr Prepared by: Dr. Bashaer Mawloud Tawfeeq, The Center of Educational and Psychological Studies Baghdad University - There is no difference statistically significant at the 0.05 level of significance between the average scores of the following students studying using model and offenders and who are studying in the usual manner (traditional) in the collection - There is no difference statistically significant at the 0.05 level of significance between the mean scores for the following students studying using model and offenders and who are studying in the usual manner (traditional) in retention Find limits: Current search
... Show MoreBackground: The present work investigated the profile and biodiversity of the pathogenic streptococci species isolated from local and imported mozzarella soft cheese in Baghdad City from October 2022 to January 2023. The study aimed to examine the molecular characterization of 16Sr RNA gene in some streptococcus species isolates from mozzarella soft cheese in Baghdad city Methods: From 50 samples, 8 isolates in all were found and identified based on the VITEK, molecular, and sequencing of the 16SrRNA gene. The eight isolates represented Lactococcus cremoris. Streptococcus alactolyticus, Streptococcus sanguinis, and Streptococcus thoraltensis. The isolates were subjected to conventional PCR and electrophoresis to detect the 16SrRNA gene usi
... Show MoreAzo-ligand-(HL)([4-((2-hydroxyquinolin-3-yl)diazenyl)-N-(5-methylisoxazol-3-yl)benzenesulfonamide] ) , (2- hydroxy quinolin derivative),reacts with the next metal ions (Cr (III), Fe (III),Co (II) and Cu(II)) forming stable complexes with unique geometries such as(tetrahedral for bothCo (II) and Cu (II), octahedral for both Cr (III) and Fe (III)). The creation of such complexes was detected by employing spectroscopic means involving ultraviolet-visible which proved the obtained geometries, Fourier transfer proved the involvement of coordinated water molecule in all complexes besides the pyrolysis (TGA & DSC) studies proved the coordination of water residues with metal ions inside the coordination sphere as well as chlorine ato
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show More