Liposome-mediated transfection of cancer cells provide a valuable experimental technique to study cellular gene expression and may also be adapted for gene therapy studies. However, the widely recognized advantage of liposome-mediated transfection is high efficiency. Therefore, this study were performed to optimize transfection techniques in human larynx carcinoma cell line Hep-2 using the commercial synthetic lipid TransFast™ Reagent and monitoring the expression efficiency by using the pSV-?-galactosidase Control Vector which encoded ?-galactosidase, maximum transfection efficiency were achieved with TransFast™ Reagent used at the Charge ratios of 2:1 and 0.5 µg DNA/ml, this is indicate that TransFast™ Reagent can be used as an efficient transfection agent to deliver foreign DNA into human larynx carcinoma cell line Hep-2 and expression of the transgene efficiently.
A hydrophilic interaction chromatography has been investigated to separate 2-deoxycytidine chosen for nucleoside. A small molecule with specific features for human serum samples was 2-deoxycytidine tested. 2-deoxycytidine has been applied to self-made stationary hydrophilic phases (ZIC1 and ZIC5). The deoxycytidine (dCD) retention was investigated with varying concentrations of sodium acetate buffer, acetonitrile%, and pH. The results confirmed the hydrophilicity of 2-deoxycytidine. The exchanger retention mechanism was studied taking into account 2-deoxycytidine used for describing the interaction of hydrophilic and cation. For both ZIC1 and ZIC5 exchangers, we described and discussed the influence of chromatographic conditions (co
... Show MoreWe present the concept of maps Γ- periodi2 on Γ -near-ring S. Our main goal is to research and explore the presence and mapping traits such as h Γ –hom anti-Γ –hom, Γ –α-derivations of Γ -periodi2 on Γ- near-rings.
Bladder dysfunction is one of the most common complications of diabetes, even exceeding nephropathy or peripheral neuropathy. Diabetic cystopathyaffects patients in both sexes, and its prevalence increases over time with diabetes; our concern is to evaluate the urodynamic findings of bladder dysfunction in diabetic patients.A cross sectional study conducted at Ghazi Al-Hariri Surgical specialized hospital during the period from the firsts of January 2018 to the end of Mar 2019, in which 118 diabetic patients (71 female and 47 male) with lower urinary tract symptoms were enrolled in the current study. The mean age (62±13) years old, 37.3% of patients presented with urgency as the main type of dysfunction. Diabetic cystopathy were fo
... Show MoreThis paper aims to study the asymptotic stability of the equilibrium points of the index 2 and index 3 Hesenberg differential algebraic equations. The problem reformulated to an equivalent explicit differential algebraic equations system, so the asymptotic stability is easily investigated. The singular points such as impasse points and singularity induced bifurcation points are identified in this kind of differential algebraic equations by using conclusion of the explicit differential algebraic equations.
This paper aims to study the asymptotic stability of the equilibrium points of the index 2 and index 3 Hesenberg differential algebraic equations. The problem reformulated to an equivalent explicit differential algebraic equations system, so the asymptotic stability is easily investigated. The singular points such as impasse points and singularity induced bifurcation points are identified in this kind of differential algebraic equations by using conclusion of the explicit differential algebraic equations.
In this paper, we introduced some fact in 2-Banach space. Also, we define asymptotically non-expansive mappings in the setting of 2-normed spaces analogous to asymptotically non-expansive mappings in usual normed spaces. And then prove the existence of fixed points for this type of mappings in 2-Banach spaces.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
In this review paper a number of studies and researches are surveyed, in order to assist the upcoming researchers, to know about the techniques available in the field of semantic based video retrieval. The video retrieval system is used for finding the users’ desired video among a huge number of available videos on the Internet or database. This paper gives a general discussion on the overall process of the semantic video retrieval phases. In addition to its present a generic review of techniques that has been proposed to solve the semantic gap as the major scientific problem in semantic based video retrieval. The semantic gap is formed because of the difference between the low level features that are extracted from video content and u
... Show More