1267 Objectives Aim to evaluate 198Au nanoparticles (AuNP) biodistribution and uptake in a human prostate model for treatment. Many phytochemicals are known to have anti-tumor properties but have short half-lives in vivo. We hypothesized that using these phytochemicals to formulate and coat AuNP would inhibit enzyme cleavage and enhance their anti-tumor properties. Initial evaluations were performed in SCID mice bearing PC3 tumors. Methods : 198AuNP were formulated with the following gum Arabic, epigalocatechin gallate (EGCg) pomegranate extract and mangiferin extract. The resultant nanoparticles were evaluated in normal mice and in human prostate bearing SCID mice. The tumor bearing mice were injected intratumorally with 3-5 uCi of 198AuNP and euthanized at the following time points 30 min, 1,2,4 and 24 hr. Various organs were removed and counted along with standards to calculate the percent injected dose per organ and per gram. Results All nanoparticles showed high retention in the tumor with the 198AuNP formulated from mangiferin showing the highest retention 80.98 ± 13.39 %ID at 30 min and remaining steady out to 24 hr 79.82 ±10.55 % ID. The tumor uptake and retention was in the following order mangiferin> pomegranate (61.5 ± 26.4 %ID > EGCg 36.2 ± 12.5 %ID > gum Arabic 17.75.± 23.36 %ID. Conclusions : 198AuNP were stably formed using gum Arabic, EGCg, pomegranate extract and mangiferin. The 198AuNp were shown to be retained in high yields in prostate tumors demonstrating their potential for ablation of prostate cancer. Research Support This research supported by NSEI, MURR, Green Technology institute /MU. Al-Yasiri supported by the University of Baghdad and NSEI.
This research deals with increasing the hardening and insulating the petroleum pipes against the conditions and erosion of different environments. So, basic material of epoxy has been mixed with Ceramic Nano Zirconia reinforcement material 35 nm with the percentages (0,1,2,3,4,5) %, whereas the paint basis of broken petroleum pipes was used to paint on it, then it was cut into dimensions (2 cm. × 2 cm.) and 0.3cm high. After the paint and percentages are completed, the samples were immersed into the paint. Then, the micro-hardness was checked according to Vickers method and thermal inspection of paint, which contained (Thermal conduction, thermal flux and Thermal diffusivity), the density of the painted samples was calculate
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
Photonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and the characterization of a relative humidity sensor based on a polymer-coated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) transmission mode. The fabrication of the sensor involved splicing a short (1 cm) length of Photonic Crystal Fiber (PCF) between two single-mode fibers (SMF). It was then coated with a layer of agarose solution. Experimental results showed that a high humidity sensitivity of 29.37 pm/%RH was achieved within a measurement range of 27–95%RH. The sensor also showed good repeatability, small size, measurement accuracy and wide humidity range. The RH sensitivity o
... Show MoreS a mples of compact magnesia and alumina were evaporated
using CO2-laser .The
Processed powders were characterized by electron microscopy
and both scanning and transmission electron microscope. The results
indicated that the particle size for both powders have reduced largely
to 0.003 nm and 0.07 nm for MgO and Al2O3, with increasing in
shape sphericity.
Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreIn this paper, The transfer function model in the time series was estimated using different methods, including parametric Represented by the method of the Conditional Likelihood Function, as well as the use of abilities nonparametric are in two methods local linear regression and cubic smoothing spline method, This research aims to compare those capabilities with the nonlinear transfer function model by using the style of simulation and the study of two models as output variable and one model as input variable in addition t
... Show MoreThe denoising of a natural image corrupted by Gaussian noise is a problem in signal or image processing. Much work has been done in the field of wavelet thresholding but most of it was focused on statistical modeling of wavelet coefficients and the optimal choice of thresholds. This paper describes a new method for the suppression of noise in image by fusing the stationary wavelet denoising technique with adaptive wiener filter. The wiener filter is applied to the reconstructed image for the approximation coefficients only, while the thresholding technique is applied to the details coefficients of the transform, then get the final denoised image is obtained by combining the two results. The proposed method was applied by usin
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More