Preferred Language
Articles
/
bijps-1467
Development of 5-FU Loaded poly lactic-co-glycolic acid Nanoparticles for Treatment of Lung Cancer
...Show More Authors

Non-Small Cell Lung Cancer (NSCLC) accounts for about 84% of all lung cancer types diagnosed so far. Every year, regardless of gender, the NSCLC targets many communities worldwide. 5-Fluorouracil (5-FU) is a uracil-analog anticancer compound. This drug tends to annihilate multiple tumour cells. But 5-FU's most significant obstacle is that it gets very easily metabolized in the blood, which eventually leads to lower anticancer activity. Therfore a perfect drug delivery system is needed to overcome all the associated challenges.

In this experiment, an attempt was made to prepare 5-FU loaded poly lactic-co-glycolic acid  nanoparticles using solvent evaporation method and subsequently observed the effect of molecular weight of poly lactic-co-glycolic acid, loading of poly lactic-co-glycolic acid, sonication period on the cytotoxic effect of 10 % w/w 5-FU loaded PLGA nanoparticles against human A549 Isogenic cell line.

In this experiment, two points are more evident: first, poly lactic-co-glycolic acid has a major impact on 5-FU release due to higher degradation and rate of diffusion in nanoparticle solution; and second, nanoparticles with a larger surface area and smaller particle size have a lower half-maximal inhibitory concentration (IC50) value. The IC50 of all nanoparticles was significantly higher (p=0.0145) than that of the free 5-FU controlled group (8.34Nm). The cytotoxicity would be greater if the IC50 value was lower. Nanoparticles with an 18-minute sonication time was found to  be more cytotoxic than those with PLGA nanoparticles containing 12% polyvinyl alcohol.

 In this experiment 10% w/w 5-FU loaded poly lactic-co-glycolic acid nanoparticles was prepared for laboratory research to translational research for the treatment of lung cancer.

Scopus Crossref
View Publication
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Hall and Joule Heating Impacts on the Rabinowitsch Fluid in a tapered Channel with Permeable Walls
...Show More Authors

      A mathematical model was created to study the influences of Hall current and Joule heating with wall slip conditions on peristaltic motion of Rabinowitsch fluid model through a tapered symmetric channel with Permeable Walls. The governing equations are simplified under low Reynolds number and the long-wavelength approximations. The perturbation method is used to solve the momentum equation. The physiological phenomena are studied for a certain set of pertinent parameters. The effects offered here show that the presence of the hall parameter, coefficient of pseudo-plasticity, and Hartman number impact the flow of the fluid model. Additional, study reveals that a height in the Hall parameter and the velocity slip parameter incre

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
On Invariant Approximations in Modular Spaces
...Show More Authors

     This article is devoted to presenting results on invariant approximations over a non-star-shsped weakly compact subset of a complete modular space by introduced a new notion called S-star-shaped with center f:  if   be a mapping and , . Then the existence of common invariant best approximation is proved for Banach operator pair of mappings by combined the hypotheses with Opial’s condition or demi-closeness condition

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Dec 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Comparison between Electroplating and Electroless on Plastic Surface
...Show More Authors

 

We report a method of converting non-conductive plastic surfaces into conductive by plating either copper electroless or copper electroplating -carbon black containing bending Agent onto Perspex plastics . Various approaches have been studied in order to comparing properties of the plated copper for two methods such as scanning electron microscopy (SEM),thickness, roughness, porosity, tensile Strength and elongation. The results show that the surface of electroplating was uniform, compact, and continuous and it had an obvious metallic sheen, while the surface of plated copper for electroless for it had many pores. Also observed that the coating was composed of small cells. Thes

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Notes On The Non Linear Operator Equation I AXAX n  *
...Show More Authors

  Necessary and sufficient conditions for the operator equation I AXAX n  * , to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.

View Publication Preview PDF
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Minimizing the Total Completion Times, the Total Tardiness and the Maximum Tardiness
...Show More Authors

In this paper, the main work is to minimize a function of three cost criteria for scheduling n jobs on a single machine. We proposed algorithms to solve the single machine scheduling multiobjective problem. In this problem, we consider minimizing the total completion times, total tardiness and maximum tardiness criteria. First a branch and bound (BAB) algorithm is applied for the 1//∑Ci+∑Ti+Tmax problem. Second we compare two multiobjective algorithms one of them based on (BAB) algorithm to find the set of efficient (non dominated) solutions for the 1//(∑Ci ,∑Ti ,Tmax) problem. The computational results show that the algorithm based on (BAB) algorithm is better than the other one for generated the total number of

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Employing Ridge Regression Procedure to Remedy the Multicollinearity Problem
...Show More Authors

   In this paper we introduce many different Methods of ridge regression to solve multicollinearity problem in linear regression model. These Methods include two types of ordinary ridge regression (ORR1), (ORR2) according to the choice of ridge parameter as well as generalized ridge regression (GRR). These methods were applied on a dataset suffers from a high degree of multicollinearity, then according to the criterion of mean square error (MSE) and coefficient of determination (R2) it was found that (GRR) method performs better than the other two methods.
 

View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Tackling Skewness, Noise, and Broken Characters in Mathematical Expression Segmentation
...Show More Authors

     Segmentation is one of the most computer vision processes importance, it aims to understand the image contents by partitioning it into segments that are more meaningful and easier to analyze. However, this process comes with a set of challenges including image skew, noise, and object clipping. In this paper, a solution is proposed to address the challenges encountered when using Optical Character Recognition to recognize mathematical expressions. The proposed method involves three stages: pre-processing, segmentation, and post-processing. During pre-processing, the mathematical expression image is transformed into a binary image, noise reduction techniques are applied, image component discontinuities are resolved, and skew corre

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
The International Journal Of Nonlinear Analysis And Applications
Developing Bulk Arrival Queuing Models with Constant Batch Policy Under Uncertainty Data Using (0-1) Variables
...Show More Authors

This paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b

... Show More
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
Automated Deception Detection Systems, a Review
...Show More Authors

Humans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th

... Show More
View Publication Preview PDF
Crossref (2)
Scopus Crossref