1267 Objectives Aim to evaluate 198Au nanoparticles (AuNP) biodistribution and uptake in a human prostate model for treatment. Many phytochemicals are known to have anti-tumor properties but have short half-lives in vivo. We hypothesized that using these phytochemicals to formulate and coat AuNP would inhibit enzyme cleavage and enhance their anti-tumor properties. Initial evaluations were performed in SCID mice bearing PC3 tumors. Methods : 198AuNP were formulated with the following gum Arabic, epigalocatechin gallate (EGCg) pomegranate extract and mangiferin extract. The resultant nanoparticles were evaluated in normal mice and in human prostate bearing SCID mice. The tumor bearing mice were injected intratumorally with 3-5 uCi of 198AuNP and euthanized at the following time points 30 min, 1,2,4 and 24 hr. Various organs were removed and counted along with standards to calculate the percent injected dose per organ and per gram. Results All nanoparticles showed high retention in the tumor with the 198AuNP formulated from mangiferin showing the highest retention 80.98 ± 13.39 %ID at 30 min and remaining steady out to 24 hr 79.82 ±10.55 % ID. The tumor uptake and retention was in the following order mangiferin> pomegranate (61.5 ± 26.4 %ID > EGCg 36.2 ± 12.5 %ID > gum Arabic 17.75.± 23.36 %ID. Conclusions : 198AuNP were stably formed using gum Arabic, EGCg, pomegranate extract and mangiferin. The 198AuNp were shown to be retained in high yields in prostate tumors demonstrating their potential for ablation of prostate cancer. Research Support This research supported by NSEI, MURR, Green Technology institute /MU. Al-Yasiri supported by the University of Baghdad and NSEI.
In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
Due to the difficulties that Iraqi students face when writing in the English language, this preliminary study aimed to improve students' writing skills by using online platforms remotely. Sixty first-year students from Al-Furat Al–Awsat Technical University participated in this study. Through these platforms, the researchers relied on stimuli, such as images, icons, and short titles to allow for deeper and more accurate participations. Data were collected through corrections, observations, and feedback from the researchers and peers. In addition, two pre and post-tests were conducted. The quantitative data were analysed by SPSS statistical Editor, whereas the qualitative data were analyzed using the Piot table, an Excel sheet. The resu
... Show More