Preferred Language
Articles
/
bijps-567
Cytotoxic Assay of Nigella sativa Leaf Callus Extract (Thymol) on Hep-2 Cell Line Using ELISA Assay
...Show More Authors

Extract from cell culture of medicinal plant like Nigella sativa have been assessed for its cytotoxic properties. Thymol is likely responsible for the theraputic effects of  Nigella sativa leaf callus extract. In this short study the inhibitory effect of Nigella sativa leaf callus extract (Thymol) has been studied on Human Lorgnx Epidrmoid Carcinoma (Hep-2) cell line during different exposure period of time (24, 48 and 72 hrs.) using different concentration of the extract (1000, 500, 400, 300, 200 and 100 µg/ml). The optical density of the Hep-2 cells has been readed on 492 nm wave length. Thymol –induced cytotoxicity was (500 µg/ml) which inhibit cell growing compared to the control and this ratio increased at the 48 hrs of exopsure and stopped at 72 hrs.

Key wards: Nigella sativa, callus extract, cell line, ELISA assay.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
International Journal On Governmental Financial Management
The Shift towards the Results-Oriented Budget and Its Impact on Government Performance Information
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Sep 21 2013
Journal Name
Nonlinear Dynamics
BER performance enhancement for secure wireless optical communication systems based on chaotic MIMO techniques
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Jan 04 2021
Journal Name
Multimedia Tools And Applications
Attention enhancement system for college students with brain biofeedback signals based on virtual reality
...Show More Authors

View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Preventive measures for banking supervision on money laundering (Search in the Gulf Commercial Bank)
...Show More Authors

The research aims to study and assess the effectiveness of preventive measures banking for the reduction of money laundering based on the checklist (Check list), which have been prepared based on the paragraphs of some of the principles and recommendations of international and Money Laundering Act No. 93 of 2004 and the instructions thereto, to examine and assess the application of these measures by Gulf Commercial Bank, which was chosen to perform the search.

I've been a statement the concept of money laundering in terms of the definition and characteristics, stages and effects of political, economic and social as well as the nature of banking supervision in terms of the definition and the most important

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Estimating the Survival Function for the Patients Suffer from the Lung Cancer Disease
...Show More Authors

          In this paper, the survival function has been estimated for the patients with lung cancer using different parametric estimation methods depending on sample for completing real data which explain the period of survival for patients who were ill with the lung cancer based on the diagnosis of disease or the entire of patients in a hospital for a time of two years (starting with 2012 to the end of 2013). Comparisons between the mentioned estimation methods has been performed using statistical indicator mean squares error, concluding that the estimation of the survival function for the lung cancer by using pre-test singles stage shrinkage estimator method was the best   . <

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
An Extensive Literature Review on Risk Assessment Models (Techniques and Methodology) for Construction Industry
...Show More Authors

This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A New Fractal Printed Dipole Antenna Based on Tent Transformations for Wireless Communication Applications
...Show More Authors

In this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Ruling on questioning children by the security authorities: (Comparative Study between Sharia and Law)
...Show More Authors

Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law

View Publication Preview PDF