Preferred Language
Articles
/
bsj-7280
In vitro isolation and expansion of neural stem cells NSCs
...Show More Authors

   Neural stem cells (NSCs) are progenitor cells which have the ability to self‑renewal and potential for differentiating into neurons, oligodendrocytes, and astrocytes. The in vitro isolation, culturing, identification, cryopreservation were investigated to produce neural stem cells in culture as successful sources for further studies before using it for clinical trials. In this study, mouse bone marrow was the source of neural stem cells. The results of morphological study and immunocytochemistry of isolated cells showed that NSCs can be produced successfully and maintaining their self‑renewal and successfully forming neurosphere for multiple passages. The spheres preserved their morphology in culture and cryopreserved to be a ready source for use in experiments as a model for neurological disorders.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
The role of some types of erythrocytes on the growth of Entamoeba histolytica trophozoite in vitro
...Show More Authors

The parasite E.histolytica was first isolated from a stool sample, and then cultivated and maintained in vitro using Locke-egg medium (LEM) and Liver infusion agar medium (LIAM) . Then, the effect of some types of erythrocytes (human and sheep), on the growth and activity of the parasite in the two culture media was investigated. The parasite was able to ingest and lysis erythrocytes of human and sheep that were supplemented to the culture media and such manipulation was able to augment the reproduction rate of the cultivated E. histolytica, however, such consequence was media- and concentration-dependent. The reproduction rate was significantly increased (66.0, 57.5 and 58.6%, respectively) in LEM medium containing human erythrocytes ty

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of Enamel Surface after Debonding of Different Types of Esthetic Brackets (An In Vitro Study)
...Show More Authors

Background: Debonding orthodontic brackets and removal of residual bonding material from the enamel surface include critical steps that may cause enamel damage. The aim of the present study was to evaluate and compare the site of bond failure and enamel surface damage after debonding of three types of esthetic brackets (composite, ceramic, sapphire) bonded with light cure composite and resin-modified glass ionomer adhesive. Materials and methods: Seventy two maxillary premolars teeth were divided into three groups each group consisted of 24 teeth according to the type of brackets. Each group was subdivided into two subgroups (12 teeth for each) according to the bonding material that was used. After 7 days of bonding procedure, the brackets

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Aug 18 2023
Journal Name
Medicinal Chemistry Research
New tolfenamic acid derivatives with hydrazine-1-carbothioamide and 1,3,4-oxadiazole moieties targeting VEGFR: synthesis, in silico studies, and in vitro anticancer assessment
...Show More Authors

View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
Application of Artificial Neural Network for Predicting Iron Concentration in the Location of Al-Wahda Water Treatment Plant in Baghdad City
...Show More Authors

Iron is one of the abundant elements on earth that is an essential element for humans and may be a troublesome element in water supplies.  In this research an AAN model was developed to predict iron concentrations in the location of Al- Wahda water treatment plant in Baghdad city by water quality assessment of iron concentrations at seven WTPs up stream Tigris River. SPSS software was used to build the ANN model. The input data were iron concentrations in the raw water for the period 2004-2011. The results indicated the best model predicted Iron concentrations at Al-Wahda WTP with a coefficient of determination 0.9142. The model used one hidden layer with two nodes and the testing error was 0.834. The ANN model coul

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An adaptive neural control methodology design for dynamics mobile robot
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Engineering
Artificial Neural Network Model for Wastewater Projects Maintenance Management Plan
...Show More Authors

Wastewater projects are one of the most important infrastructure projects, which require developing strategic plans to manage these projects. Most of the wastewater projects in Iraq don’t have a maintenance plan. This research aims to prepare the maintenance management plan (MMP) for wastewater projects. The objective of the research is to predict the cost and time of maintenance projects by building a model using ANN. The research sample included (15) completed projects in Wasit Governorate, where the researcher was able to obtain the data of these projects through the historical information of the Wasit Sewage Directorate. In this research artificial neural networks (ANN) technique was used to build two models (cost

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems using Convolutional Neural Network
...Show More Authors

Preview PDF