Preferred Language
Articles
/
bsj-1284
Evaluation of Transfected HEP-2 Cell Line Using ß-Galactosidase Reporter Assay System
...Show More Authors

Liposome-mediated transfection of cancer cells provide a valuable experimental technique to study cellular gene expression and may also be adapted for gene therapy studies. However, the widely recognized advantage of liposome-mediated transfection is high efficiency. Therefore, this study were performed to optimize transfection techniques in human larynx carcinoma cell line Hep-2 using the commercial synthetic lipid TransFast™ Reagent and monitoring the expression efficiency by using the pSV-?-galactosidase Control Vector which encoded ?-galactosidase, maximum transfection efficiency were achieved with TransFast™ Reagent used at the Charge ratios of 2:1 and 0.5 µg DNA/ml, this is indicate that TransFast™ Reagent can be used as an efficient transfection agent to deliver foreign DNA into human larynx carcinoma cell line Hep-2 and expression of the transgene efficiently.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Global Pharma Technology
Synthesis of New 2, 4, 5-triphenyl imidazole Derivatives Derived from benzoin and Studying their Biological Activity
...Show More Authors

compound [1] was formed from the reaction of benzoin and benzaldehyde in the presence of ammonia, which was reacted with sodium hydride in DMF to obtain imidazole salt. This salt was reacted with adipoyl chloride to give compound [2]. Acid hydrazide derivative [3] was obtained from the reaction of compound [2] with hydrazine hydrate. After that Shiff bases [4-9] have been synthesized from the reaction of compound [3] with different aromatic aldehydes. These new formed compounds were diagnosed by 13C-NMR, 1H-NMR for some of them (in Ahl-Albate University in Jordan) and FT-IR spectroscopy (In Baghdad University). All of the prepared products have been studied their biological activities toward two kinds of bacteria. These products show

... Show More
Scopus (7)
Scopus
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Complexes of Some Transition Metal with 2-Benzoyl thiobenzimidazole and 1,10-Phenanthroline and Studying their Antibacterial Activity
...Show More Authors

Mixed ligands of 2-benzoyl Thiobenzimiazole (L1) with 1,10-phenanthroline (L2) complexes of Cr(III) , Ni(II) and Cu(II) ions were prepared. The ligand and the complexes were isolated and characterized in solid state by using FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR, flame atomic absorption, elemental micro analysis C.H.N.S, magnetic susceptibility , melting points and conductivity measurements. 2-Benzoyl thiobenzimiazole behaves as bidenetate through oxygen atom of carbonyl group and nitrogen atom of imine group. From the analyses Octahedral geometry was suggested for all prepared complexes. A theoretical treatment of ligands and their metal complexes in gas phase were studied using HyperChem-8 program, moreover, ligands in gas phase

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 31 2012
Journal Name
Journal Of The College Of Education - University Of Tikrit
Synthesis, Spectroscopic and Biological Studies of some Metal Complexes with 1-phenyl-2(1-phenyl ethylidene) hydrozine.
...Show More Authors

Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Antibacterial of 2,3-Dihydrobenzo Thiazole-2-Carboxylic Acid Complexes with Some Selected Metal Ions
...Show More Authors

A new ligand 2,3-dihydrobenzo [d] thiazole-2-carboxylic acid (L) has been prepared from the reaction of ortho amino phenyl thiol with dichloroacetic acid in mole ratio (1:1). It has been characterized by elemental analysis (C.H.N.), IR, UV- Vis.spectraand 1H, 13C-NMR. A new series complexes of the bivalent ions (Co, Ni, Cu, Pd, Cd, Hg and Pb) and the trivalent (Cr) have been prepared and characterized too. The structural has been established by elemental analysis (C.H.N.), IR, UV-Vis. spectra, molar conductivity, atomic absorption and magnetic susceptibility measurements. The synthesized complexes were prepared in (1:2) ratio correspond to (Co(II), Ni(II), Cu(II), Pd(II), Cd(II), Hg(II) and Pb(II) complexes while in case Cr(III) complex is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Health Science Reports
Immunohistochemical expression of angiotensin‐converting enzyme 2 in superficial and deep maxillofacial tissues: A cross‐sectional study
...Show More Authors
Abstract<sec><title>Background and Aims

The involvement of maxillofacial tissues in SARS‐CoV‐2 infections ranges from mild dysgeusia to life‐threatening tissue necrosis, as seen in SARS‐CoV‐2‐associated mucormycosis. Angiotensin‐converting enzyme 2 (ACE2) which functions as a receptor for SARS‐CoV‐2 was reported in the epithelial surfaces of the oral and nasal cavities; however, a complete understanding of the expression patterns in deep oral and maxillofacial tissues is still lacking.

Methods

The immunohistochemical expression of ACE2 was analyzed in 95 specimens from maxillofacial tissues and 10 specimens o

... Show More
View Publication
Scopus (2)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 13 2022
Journal Name
Dental Hypotheses
Comparative Evaluation of Marginal Microleakage Between Bulk-Fill, Preheated Bulk-Fill, and Bulk-Fill Flowable Composite Resins Above and Below Cemento-Enamel Junction Using Micro-Computed Tomography: An In Vitro Study
...Show More Authors

Objective: The aim of this study was to compare the marginal microleakage between bulk-fill, preheated bulk-fill, and bulk-fill flowable composite resins above and below cemento-enamel junction (CEJ) using micro-computed tomography. Methods: Sixty freshly extracted premolar teeth were prepared with a slot shaped cavities of a total of 120 Class II: 3mm (bucco-lingual), 2mm (mesio-distal) with mesial-gingival margin located 1mm coronal to CEJ, and distal gingival margin located 1mm apical to the CEJ. The samples were randomly divided into two main groups according to the restorative material (Tetric EvoCeram and 3M Filtek), and each group was further sub-divided into three subgroups according to the consistency (bulk fill, preheated bulk fil

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Association of a genetic variant (rs689466) of Cyclooxygenase-2 gene with chronic periodontitis in a sample of Iraqi population
...Show More Authors

Background: periodontitis is a chronic inflammatory disease causing destruction of the tooth supporting structures, initiated by dental plaque and modified by environmental and genetic risk factors. Cyclooxygenase-2 (COX-2) enzyme is responsible for the production of prostaglandin E2, an important mediator in the chronic periodontitis (CP) pathogenesis. Polymorphisms in COX-2 gene have linked to CP in different populations. Aim: To study the association between Cyclooxygenase-2 single nucleotide polymorphism rs689466 (-1195A/G SNP) and chronic periodontitis in a sample of Iraqi population. Methods: One hundred Iraqi subjects divided into two groups: case group consisted of 70 CP patient (35 males and 35 females) with age range 30-55 year

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF