Preferred Language
Articles
/
bsj-2469
The Prognostic Value of some Epithelial-Mesenchymal Transition Markers and Metastasis-Related Markers in Human Transitional Cell Carcinoma of the Bladder
...Show More Authors

Recent reports provided evidence that epithelial to mesenchymal transition (EMT) and some matrix metalloproteinases (MMPs) contribute to the invasion and metastasis of cancer cells. This study investigated the expression pattern of some EMT markers (E-cadherin and Vimentin) and some MMPs (MMP-2 and MMP-9) in transitional cell carcinoma (TCC). Fifty five paraffin embedded biopsies were included in this study. Expression pattern of E-cadherin and Vimentin was evaluated by immunohistochemistry while cytoplasmic mRNA expression of both MMP-2 and MMP-9 were determined by in situ hybridization. The expression of all markers were significantly increased with the increase of patient's age (? 50 years), and furthermore an increase in men expression when compared to women. Interestingly, all healthy tissues showed positive E-cadherin expression while they did not show any expression of Vimentin, MMP-2 and MMP-9. E-cadherin expression decreased, whereas expression of Vimentin increased according to the grade and stage of the tumor. Similarly, both MMP-2 and MMP-9 expression were increased with the progression of TCC. The current study conclude that a decrease in E-cadherin together with increased Vimentin, MMP-2 and MMP-9 are significant markers that correlate with poor prognosis of TCC.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by p

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Nov 28 2020
Journal Name
Iraqi Journal Of Science
Electrochemical Deposition of Hydroxyapatite Co-Substituted By Sr/Mg Coating on Ti-6Al-4V ELI Dental Alloy Post-MAO as Anti-Corrosion
...Show More Authors

This work involved the co-substitution of the two bioactive ions of strontium and magnesium into the hydroxyapatite (HA) coating which was then electrochemically deposited on Ti-6Al-4V ELI dental alloy (Gr.23) before and after treatment by Micro Arc Oxidation (MAO). The deposited layers were characterized by scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The adhesion strength of the coating layer was estimated by using pull-off adhesion test. The adhesion strength of Sr/Mg-HA on the Ti-6Al-4V ELI dental alloy after MAO treatment was 1.79 MPa, which was higher than that before MAO treatment (1.62 MPa). The corrosion behavior of th

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Thu May 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Multipole Mixing Ratios of Gamma Rays From Fe(n,nγ) Fe 56 56 26 26  Reaction Using Constant Statistical Tensor Method (CST).
...Show More Authors

The - Multiple mixing ratios of -transitions from levels of 56Fe populated in 56 56 ( , ) Fe n n Fe  ï‚¢ reactions are calculated by using const. S.T.M.  This method has been used in other works [3,7] but with pure transition or with  transitions that can be considered as pure transitionsØŒ in our work we used   This method for mixed  - transitions in addition to pure  - transitions. The experimental angular distribution coefficients a2 was used from previous works [1] in order to calculet - values. It is clear from the results that the - values are in good agreement or consistent, within associated errors, with those reported previously [1]. The discrepancies that occur

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
A Mathematical Model of a Thermally Activated Roof (TAR) Cooling System Using a Simplified RC-Thermal Model with Time Dependent Supply Water Temperature
...Show More Authors

This paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Uptake of Three Pharmaceuticals by Beans (Phaseolus vulgaris L.) from Contaminated Soils: امتصاص ثلاثة انواع من الادوية بواسطة نبات الفاصولياء في التربة الملوثة
...Show More Authors

The ability of beans (Phaseolus vulgaris L.) to uptake three pharmaceuticals (diclofenac, mefenamic acid and metronidazole) from two types of soil (clay and sandy soil) was investigated in this study to explore the human exposure to these pharmaceuticals via the consumption of beans. A pot experiment was conducted with beans plants which were grown in two types of soil for six weeks under controlled conditions. During the experiment period, the soil pore water was collected weekly and the concentrations of the test compounds in soil pore water as well as in plant organs (roots, stems and leaves) were weekly determined.
The results showed that the studied pharmaceuticals were detected in all plant tissues; their concentration

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 27 2019
Journal Name
Journal Of Nano Research
A Specific NH&lt;sub&gt;3&lt;/sub&gt; Gas Sensor of a Thick MWCNTs-OH Network for Detection at Room Temperature
...Show More Authors

NH3 gas sensor was fabricated based on deposited of Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) suspension on filter paper substrates using suspension filtration method. The structural, morphological and optical properties of the MWCNTs film were characterized by XRD, AFM and FTIR techniques. XRD measurement confirmed that the structure of MWCNTs is not affected by the preparation method. The AFM images reflected highly ordered network in the form of a mat. The functional groups and types of bonding have appeared in the FTIR spectra. The fingerprint (C-C stretch) of MWCNTs appears in 1365 cm-1, and the backbone of CNTs observed at 1645 cm-1. A homemade sensi

... Show More
View Publication
Scopus (16)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
2-Prime Modules
...Show More Authors

      In this paper, we introduce the notion of a 2-prime module as a generalization of prime module E over a ring R, where E is said to be prime module if (0) is a prime submodule. We introduced the concept of the 2-prime R-module. Module E is said to be 2-prime if (0) is 2-prime submodule of E. where a proper submodule K of module E is 2-prime submodule if, whenever rR, xE, E, Thus xK or [K: E].

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
On Graph- Syriac Letters Partition
...Show More Authors

     The Syriac language is one of the ancient Semitic languages that appeared in the first century AD. It is currently used in a number of cities in Iraq, Turkey, and others. In this research paper, we tried to apply the work of  Ali and Mahmood 2020  on the letters and words in the Syriac language to find a new encoding for them and increase the possibility of reading the message by other people.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref