Preferred Language
Articles
/
bijps-1507
Anti-Angiogenic Screening of Moringa Oleifera Leaves Extract Using Chorioallantonic Membrane Assay
...Show More Authors

Background: Angiogenesis is defined as the formation of new blood vessels. However, angiogenesis in cancer will lead to tumour growth and metastasis. Therefore, anti-angiogenesis is one of the ways to slow down growth and spreading of tumour. Moringa oleifera is also known as a “Miracle tree” which has high nutritive value and various therapeutics effect in different parts of the plant. This study aims to determine the anti-angiogenic property of Moringa oleifera leaves extract by using chick chorioallantoic membrane (CAM) assay. Materials and Methods: The extracts were prepared by decoction method using methanol and water. The qualitative phytochemical screening was carried out for both methanol and aqueous extracts. The fertilised chicken eggs were divided into six groups which include negative control group (phosphate-buffer saline with pH 7.4), positive control group (sunitinib), 50% and 100% methanol extract, 50% and 100% aqueous extract. The anti-angiogenic effect of Moringa oleifera leaves extract was determined by calculating the number and percentage decrease in blood vessels in post-24 and post-48 hours of treatment. Results: Statistical analysis by one-way ANOVA has shown significant (p<0.05) percentage reduction in the blood vessels between each treatment group after 48 hours of treatment. Among all the extracts, 100% aqueous extract of Moringa oleifera was found to have highest anti-angiogenic effect with the greater percentage decrease in blood vessels (81.33%) in post-48 hours of treatment. Furthermore, the anti-angiogenic effect of Moringa oleifera leaves was found to increased when the concentration of the Moringa oleifera extract was increased. Conclusion: Moringa oleifera leaves with various phytochemicals was found to possess anti-angiogenic potential.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 16 2009
Journal Name
Journal Of Planner And Development
Support environmental programs using knowledge management
...Show More Authors

The research deals with Environmental Management and how to develop its programs with the use of Knowledge Management, the environmental programs that integrate with processes can add strategic value to business through improving rates of resource utilization , efficiencies , reduce waste, use risk management, cut costs, avoid fines and reduce insurance. All these activities and processes can improve it through knowledge management, the optimal usage for all organizations information , employ it in high value and share it among all organizations members who involves in modify its strategy . Choosing suitable environmental management information system, develop it and modify it with organization processes, can greatly serve the en

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
Using Online Platforms to Improve Writing
...Show More Authors

Due to the difficulties that Iraqi students face when writing in the English language, this preliminary study aimed to improve students' writing skills by using online platforms remotely. Sixty first-year students from Al-Furat Al–Awsat Technical University participated in this study. Through these platforms, the researchers relied on stimuli, such as images, icons, and short titles to allow for deeper and more accurate participations. Data were collected through corrections, observations, and feedback from the researchers and peers. In addition, two pre and post-tests were conducted. The quantitative data were analysed by SPSS statistical Editor, whereas the qualitative data were analyzed using the Piot table, an Excel sheet. The resu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ssrn Electronic Journal
Human Mobility Patterns Modelling Using Cdrs
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Using LiF Disc in Thermoluminescence Dosimetry
...Show More Authors

A LiF (TLD-700) PTFED disc has adiameter of (13mm) and thickness of (0.4mm) for study the response and sensetivity of this material for gamma and beta rays by using (TOLEDO) system from pitman company. In order to calibrate the system and studying the calibration factor. Discs were irradiated for Gamma and Beta rays and comparing with the theoretical doses. The exposure range is between 15×10-2 mGy to 1000×10-2 mGy. These doses are within the range of normal radiation field for workers.

View Publication Preview PDF
Crossref