يعتبر "تاج الأشواك" أو نبات شوكة المسيح، وهو من نباتات الزينة الطبية ، ينتمي إلى جنس يوفوربيا. E. milii يحتوي كميات وفيرة من المركبات الفينولية ، التربينات، الستيرويدات والقلويدات. كانت الأهداف الرئيسية لهذه الدراسة هي فحص مستخلصات الفلافونويد والنانو فلافونويد ضد نوعين من خطوط الخلايا السرطانية. تم تصنيع مركبات الفلافونويد النانوية عن طريق تفاعل مركب الكيتوسان والماليك اسد. تم تحليل مركبات الفلافونويد النانوية بواسطة مقياس الطيف الضوئي UV-sp -8001 بطول موجي 200-1000 نانومتر ، تم استخدام المجهر الإلكتروني (TEM) والمجهري الإلكتروني الماسح(SEM) لتحديد الخصائص المورفولوجية لمركبات الفلافونويد النانوية. يعتبر الفلافونويد والنانوفلافونويدعقار قوي ومتطور ضد خلايا سرطان الثدي (MCF-7) وخلايا سرطان البروستات(PC3) . تم فحص الفعالية المضادة للسرطان من مركبات الفلافونويد والنانوفلافونويد على خطين مختلفين من الخلايا السرطانية وكذلك خطوط الخلايا السليمة باستخدام اختبار MTT. تم استخدام تجزئة الحمض النووي وتقنية تلوين الخلايا بالصبغة المزدوجة AO / EtBr لفحص علامات موت الخلايا المبرمج. لتحديد تشتت دورة الخلية ، تم استخدام قياس التدفق الخلوي ، وأظهرت النتائج أن كميات الفلافونويد والنانوفلافونويد لها نشاطا ساما وفعالا ضد خطوط خلايا سرطان الثدي والبروستات. بالإضافة إلى ذلك ، تم ربط إيقاف دورة الخلية في مرحلة G0 / G1 بموت الخلايا المبرمج لخطوط الخلايا التي يسببها الفلافونويد والنانوفلافونويد. وفقًا لهذه النتائج ، تمنع مركبات الفلافونويد والنانوفلافونويد من تكاثر خطوط الخلايا السرطانية ، مما يؤدي إلى توقف دورة الخلية وتحفيز موت الخلايا المبرمج. تشير النتائج المتاحة إلى أن مركب الفلافونويد والنانوفلافونويد سيمثل نهجًا علاجيًا واعدًا لعلاج الخلايا السرطانية من الأنواع الأخرى.
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
A pulsed (TEA-0O2) laser was used to dissociate molecules of silane ethylene (C2I-14) and ammonia (NH3) gases, through collision assisted multiple photon dissociation (MPD) to deposit(SiC i_xNx) thin films, where the X-values are 0, 0.13 and 0.33, on glass substrate at T,----648 K. deposition rate of (0.416-0.833) nm/pulse and thickness of (500-1000)nm .Fourier transform infrared spectrometry (FT-IR) was used to study the nature of the chemical bonds that exist in the films. Results revealed that these films contain complex networks of the atomic (Si, C, and N), other a quantity of atomic hydrogen and chemical bonds such as (Si-N, C-N, C-14 and N-H).Absorbance and Transmittance spectra in the wavelength range (400-1100) nm were used to stud
... Show MoreAthletics are different from other games as a competition between individuals to show their competence and physical ability to achieve new record numbers in the various activities and various between the boards, jumping and throwing and each type of these activities in particular performance so found the researcher to find the method of training resistors in the development of special power and achievement In the effectiveness of javelin, where the researchers chose the sample of the athletes from the specialized school of athletics to effectively throw the spear at the ages of 15-17 years and carried out the tests of the research, which includes the strength of the speed of the arms and explosive power and The various resistance exercise
... Show MoreTo the Banks capital several uses, including the protection of deposits and this was approved by the Basel Committee, And Finance long-term investments which intended to investment in fixed assets that are essential to the continuation of banking activity, Fixed assets not financed from the funds of the deposit, but the owner equity do this jop. the current research tries to prove the effect of banks capital on fixed assets for a sample of iraqi private banks (bank of baghdad and Iraqi middle east Investment bank), for the period from 2011 until 2014. The research concluded that the capital of bank of baghdad affect on his total fixed assets by (84%), and the capital of Iraqi middle east Investment bank affect on his total fixed assets b
... Show More