Human serum albumin (HSA) nanoparticles have been widely used as versatile drug delivery systems for improving the efficiency and pharmaceutical properties of drugs. The present study aimed to design HSA nanoparticle encapsulated with the hydrophobic anticancer pyridine derivative (2-((2-([1,1'-biphenyl]-4-yl)imidazo[1,2-a]pyrimidin-3-yl)methylene)hydrazine-1-carbothioamide (BIPHC)). The synthesis of HSA-BIPHC nanoparticles was achieved using a desolvation process. Atomic force microscopy (AFM) analysis showed the average size of HSA-BIPHC nanoparticles was 80.21 nm. The percentages of entrapment efficacy, loading capacity and production yield were 98.11%, 9.77% and 91.29%, respectively. An In vitro release study revealed that HSA-BIPHC nanoparticles displayed fast dissolution at pH 7.4 compared to pH 3.4. They have also showed a higher cytotoxic activity against MCF-7 human breast cancer cells. The possible binding of the BIPHC into the tyrosine threonine kinase (TTK) was studied using molecular modeling. The findings of this study introduced a promising candidate model of HSA nanoparticles for delivering of BIPHC anticancer drug. These novel nanoparticles are characterized by their ability to carry a hydrophobic BIPHC agent and control drug release with improved targeting of breast cancer cells.
Abstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreBackground: H1N1 influenza pandemic or swine flu was an influenza pandemic first described in Iraq in October 2009 .The virus appeared to be anew strain of H1N1 causes wide range of morbidity and mortality among different genders and age groups as part of worldwide pandemics.Seasonal flu is a contagious respiratory illness caused by influenza viruses that infect the nose, throat, and lungs. It can cause mild to severe illness, and at times can lead to death. The best way to prevent the flu is by getting a flu vaccine each year.
Objectives: Is to determine the morbidity and mortality in different age groups in patients with H1N1 influenza versus those patients with seasonal influenza who were admitted at the same time to AL-kindy
... Show MoreVagrancy is global problem, but its geographical distribution differs from one society
to another and from one place to another inside the same society.Till now there isn't a real factor that can explain the phenomenon, spite that economy plays aconstituent and distinguishing part, and spite the fact that Vagrancy is considered a realdeviation that can be compared with criminality level, and cannot be separated from its effecton family, local society and school. In addition to unprecedented work under heavily pressurethat attack to a minimum protection and safety. Vagrant may be a child, a teen, a young, or
even an old man. Vagrancy thus means different people with different ages and not onlyprecisely children. Vagrant is not neces
The study included three topics, the definition of the personality of Imam al-Bazazi, his scientific biography, his elders, his writings, his students and his death, selected issues of his weightiness related to purity, and the Imam al-Bazazi is Muhammad ibn Muhammad ibnShihabibn Yusuf, known in al-Kardari al-Hanafi al-Balzazi. The other doctrines, the author relied in his book on the sources of the previous scholars of the Hanafis, and make them the basis in his book, the author did not adopt the definitions of language and terminology, and rarely mention the evidence Shariah adopted by scientists in their opinions, and limited to mention only opinions, In front of the first issue spotlessly water user, and the second issue that sleep l
... Show MoreLaser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of arte
Maximum power point tracking (MPPT) is used in photovoltaic (PV) systems to enhance efficiency and maximize the output power of PV module, regardless the variation of temperature, irradiation, and the electrical characteristics of the load. A new MPPT system has been presented in this research, consisting of a synchronous DC-DC step-down Buck converter controlled by an Arduino microcontroller based unit. The MPPT process with Perturb and Observe method is performed with a DC-DC converter circuit to overcome the problem of voltage mismatch between the PV modules and the loads. The proposing system has high efficiency, lower cost and can be easily modified to handle more energy sources. The test results indicate that the u
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThe present research tackles a number of historical facts and incidents with a purely legal dimension in an important stage in the contemporary history of Iraq, especially the era of the British occupation. This resulted in innumerable social, political and legal problems, particularily the judicial legislation problems in Iraq. These legislations included a set of civil laws and in force governmental procedures that will be discussed historically by examining documents issued by the Ministries of Justice and Interior Affairs in the governments of monarchy for the period from 1921-to-1958. The data of the present paper relied on the Iraqi Library and Archives, (hence DKW). The study adopted the narrative historical methodology when inves
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show More