Human serum albumin (HSA) nanoparticles have been widely used as versatile drug delivery systems for improving the efficiency and pharmaceutical properties of drugs. The present study aimed to design HSA nanoparticle encapsulated with the hydrophobic anticancer pyridine derivative (2-((2-([1,1'-biphenyl]-4-yl)imidazo[1,2-a]pyrimidin-3-yl)methylene)hydrazine-1-carbothioamide (BIPHC)). The synthesis of HSA-BIPHC nanoparticles was achieved using a desolvation process. Atomic force microscopy (AFM) analysis showed the average size of HSA-BIPHC nanoparticles was 80.21 nm. The percentages of entrapment efficacy, loading capacity and production yield were 98.11%, 9.77% and 91.29%, respectively. An In vitro release study revealed that HSA-BIPHC nanoparticles displayed fast dissolution at pH 7.4 compared to pH 3.4. They have also showed a higher cytotoxic activity against MCF-7 human breast cancer cells. The possible binding of the BIPHC into the tyrosine threonine kinase (TTK) was studied using molecular modeling. The findings of this study introduced a promising candidate model of HSA nanoparticles for delivering of BIPHC anticancer drug. These novel nanoparticles are characterized by their ability to carry a hydrophobic BIPHC agent and control drug release with improved targeting of breast cancer cells.
The different interactions between cometary tail and solar wind ions are studied in the present paper based on three-dimensional Lax explicit method. The model used in this research is based on the continuity equations describing the cometary tail-solar wind interactions. Three dimensional system was considered in this paper. Simulation of the physical system was achieved using computer code written using Matlab 7.0. The parameters studied here assumed Halley comet type and include the particle density , the particles velocity v, the magnetic field strength B, dynamic pressure p and internal energy E. The results of the present research showed that the interaction near the cometary nucleus is mainly affected by the new ions added to the
... Show MoreTexture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.
Intelligent or smart completion wells vary from conventional wells. They have downhole flow control devices like Inflow Control Devices (ICD) and Interval Control Valves (ICV) to enhance reservoir management and control, optimizing hydrocarbon output and recovery. However, to explain their adoption and increase their economic return, a high level of justification is necessary. Smart horizontal wells also necessitate optimizing the number of valves, nozzles, and compartment length. A three-dimensional geological model of the As reservoir in AG oil field was used to see the influence of these factors on cumulative oil production and NPV. After creating the dynamic model for the As reservoir using the program Petrel (2017.4), we
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
This study aimed to show the relationship between mental health and shyness for university students in Baghdad and Al – Mustansiria university which its subject was (200) students , ( 100) males and ( 100) females , Mental Health scale which is constructed by (Al – Janabi 1991) and developed by (Hassan 2006) was used for this aim ,The scale of shyness was built according to a questioner to the students and according to previous publications and studies .
Multiple regulation analysis step - wise was used for data analysis in order to identify the possibility to find single or couple indications for the independent variable (mental
... Show MoreThe base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show More