Preferred Language
Articles
/
bBbQm4cBVTCNdQwChFhP
On-Line Navigational Problem of a Mobile Robot Using Genetic Algorithm
...Show More Authors

Publication Date
Tue Jul 04 2023
Journal Name
Ankara Universitesi Eczacilik Fakultesi Dergisi
ANTIANGIOGENIC ACTIVITY AND ROS-MEDIATED LUNG CANCER CELL LINE INJURY OF ZERUMBONE
...Show More Authors

Objective: Zerumbone (ZER) is a well-known natural compound that has been reported to have anti-cancer effect. Thus, this study investigated the ZER potential to inhibit Thymidine Phosphorylase (TP) and the ability to trigger Reactive oxygen species (ROS)-mediated cytotoxicity in non-small cell lung cancer, NCI-H460, cell line. Material and Method: The antiangiogenic activity for ZER was evaluated by using the thymidine phosphorylase inhibitory test. Reactive oxygen species (ROS) production was determined via DCFDA dye by using flow cytometry. Result and Discussion: ZER was found to be potent TP inhibitory with the IC50 value of 50.3± 0.31 μg/ml or 230±1.42 µM. NCI-H460 cells upon treatment with ZER produced sign

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 20 2023
Journal Name
Ankara Universitesi Eczacilik Fakultesi Dergisi
ANTIANGIOGENIC ACTIVITY AND ROS-MEDIATED LUNG CANCER CELL LINE INJURY OF ZERUMBONE
...Show More Authors

Objective: Zerumbone (ZER) is a well-known natural compound that has been reported to have anti-cancer effect. Thus, this study investigated the ZER potential to inhibit Thymidine Phosphorylase (TP) and the ability to trigger Reactive oxygen species (ROS)-mediated cytotoxicity in non-small cell lung cancer, NCI-H460, cell line. Material and Method: The antiangiogenic activity for ZER was evaluated by using the thymidine phosphorylase inhibitory test. Reactive oxygen species (ROS) production was determined via DCFDA dye by using flow cytometry. Result and Discussion: ZER was found to be potent TP inhibitory with the IC50 value of 50.3± 0.31 μg/ml or 230±1.42 µM. NCI-H460 cells upon treatment with ZER produced sign

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Ieice Transactions On Communications
Fast Handoff Scheme for Cluster-Based Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Lightweight route adjustment strategy for mobile sink wireless sensor networks
...Show More Authors

<span>As a result of numerous applications and low installation costs, wireless sensor networks (WSNs) have expanded excessively. The main concern in the WSN environment is to lower energy consumption amidst nodes while preserving an acceptable level of service quality. Using multi-mobile sinks to reduce the nodes' energy consumption have been considered as an efficient strategy. In such networks, the dynamic network topology created by the sinks mobility makes it a challenging task to deliver the data to the sinks. Thus, in order to provide efficient data dissemination, the sensor nodes will have to readjust the routes to the current position of the mobile sinks. The route re-adjustment process could result in a significant m

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 19 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
The Impact Of Innovative Matrix Strategy And The Problem Tree Strategy On The Mathematical Proficiency Of Intermediate Grade Female Students
...Show More Authors

The research aims to know the impact of the innovative matrix strategy and the problem tree strategy in teaching mathematics to intermediate grade female students on mathematical proficiency. To achieve the research objectives, an experimental approach and a quasi-experimental design were used for two equivalent experimental groups. The first is studied according to the innovative matrix strategy, the second group is studied according to the problem tree strategy. The research sample consisted of (32) female students of the first intermediate grade, who were intentionally chosen after ensuring their equivalence, taking into several factors, most notably (chronological age, previous achievement, and intelligence test). The research tools con

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 03 2022
Journal Name
Journal Ofxi'an University Of Architecture & Technology
Extent of mathematics teachers' appreciation of the mathematical problem `multiple solutions
...Show More Authors

Aims to find out the (Extent of mathematics teachers' appreciation of the mathematical problem `multiple solutions) Research sample consisted of (100) mathematics teachers distributed on the General Directorates of Education in Baghdad (Rusafa 1/2/3) and (Karkh 1/2/ 3) There was two research approach which are: The first - two different answers of students to the same issue where teachers must assess each answer and explain which one the teacher will accept and why? The second - Different solutions of students' to the same issue, including wrong answers , Teachers should correct the answers and give them final grades (0-10). Descriptive and analytical Approch was used in this research methodology And zero hypotheses, which are as f

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Semi-parametric regression function estimation for environmental pollution with measurement error using artificial flower pollination algorithm
...Show More Authors

Artificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing flower pollination algorithm in the environmental field to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement. We estimate the regression function of the semi-parametric model by estimating the parametric model and estimating the non-parametric model, the parametric model is estimated by using an instrumental variables method (Wald method, Bartlett’s method, and Durbin

... Show More
Publication Date
Sun Apr 13 2025
Journal Name
Scientific Reports
Optimized image segmentation using an improved reptile search algorithm with Gbest operator for multi-level thresholding
...Show More Authors
Abstract<p>Image segmentation using bi-level thresholds works well for straightforward scenarios; however, dealing with complex images that contain multiple objects or colors presents considerable computational difficulties. Multi-level thresholding is crucial for these situations, but it also introduces a challenging optimization problem. This paper presents an improved Reptile Search Algorithm (RSA) that includes a Gbest operator to enhance its performance. The proposed method determines optimal threshold values for both grayscale and color images, utilizing entropy-based objective functions derived from the Otsu and Kapur techniques. Experiments were carried out on 16 benchmark images, which inclu</p> ... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Development Binary Search Algorithm
...Show More Authors

There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref