Preferred Language
Articles
/
dRcShJMBVTCNdQwCpdTp
Designing of Human Serum Albumin Nanoparticles for Drug Delivery: a Potential Use of Anticancer Treatment
...Show More Authors

Human serum albumin (HSA) nanoparticles have been widely used as versatile drug delivery systems for improving the efficiency and pharmaceutical properties of drugs. The present study aimed to design HSA nanoparticle encapsulated with the hydrophobic anticancer pyridine derivative (2-((2-([1,1'-biphenyl]-4-yl)imidazo[1,2-a]pyrimidin-3-yl)methylene)hydrazine-1-carbothioamide (BIPHC)). The synthesis of HSA-BIPHC nanoparticles was achieved using a desolvation process. Atomic force microscopy (AFM) analysis showed the average size of HSA-BIPHC nanoparticles was 80.21 nm. The percentages of entrapment efficacy, loading capacity and production yield were 98.11%, 9.77% and 91.29%, respectively. An In vitro release study revealed that HSA-BIPHC nanoparticles displayed fast dissolution at pH 7.4 compared to pH 3.4. They have also showed a higher cytotoxic activity against MCF-7 human breast cancer cells. The possible binding of the BIPHC into the tyrosine threonine kinase (TTK) was studied using molecular modeling. The findings of this study introduced a promising candidate model of HSA nanoparticles for delivering of BIPHC anticancer drug. These novel nanoparticles are characterized by their ability to carry a hydrophobic BIPHC agent and control drug release with improved targeting of breast cancer cells.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
paratexte in specialized literary journals : AL ADEEB AL IRAQI magazine is a model
...Show More Authors

Post-structural critical studies highlighted the importance of studying the texts surrounding the text as an important part in the process of receiving and understanding texts, and although this topic was dealt with by the ancient Arabs and Europeans, interest in it appeared clearly after the appearance of Gerard Genet's book (SEUILS), which separated it Text Thresholds. Or what he called paratexte, and dealt with them with interest as he reads them on books. With the development of semiotic studies, interest in paratexte studies began in a broader way and in various literary and non-literary texts, including journalistic texts. And since specialized magazines are one of the press releases that enjoy their privacy in terms of topics and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
Directing Techniques to Process the Radio Drama Script ( Khata'a Play as a Sample)
...Show More Authors

     The radio drama is considered to be one of the arts that is discovered after a long period of theater's discovery. Initially , it was the broad framework of the theater's work when radio was broadcasting the shows on the huge theaters. This beginning encouraged many of the radio specialists to correlate plays with radio and make a novice and distinctive type of art. Thus, radio drama made its first step including the following   ( plays, short and long series drama as well as other types of radio arts). Because of the above mentioned , the researcher is stimulating  to study directing techniques to process the radio drama script ( Khata'a play as a sample).

The first chapter deals with the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (206)
Crossref (199)
Scopus Clarivate Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Heat Transfer
The indirect solar dryers with innovative solar air heaters designs: A review article
...Show More Authors
Abstract<p>The drying process is considered an effective technique for preserving foods and agricultural products from spoilage. Moreover, the drying process lessens the products' weight, volume, and packaging, which prompts a reduction in the products' transportation costs. The drying technique with solar energy represents an ancient method, still alluring due to solar energy abundance and cost‐effectiveness. In this article, the previous manuscripts concerned with studying and analyzing indirect solar dryer systems that utilize innovative solar air heaters (SAHs) are reviewed. The results and conclusions are discussed intensively to clarify the significance of utilizing this type of drying technique. The ef</p> ... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed May 26 2021
Journal Name
Energies
Rotational Piezoelectric Energy Harvesting: A Comprehensive Review on Excitation Elements, Designs, and Performances
...Show More Authors

Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect

... Show More
View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (159)
Crossref (113)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Pakistan Heart Journal
Workplace Violence and Nursing Job Performance at Pediatric Emergency Departments: A Comparative Study
...Show More Authors

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref