Preferred Language
Articles
/
ijl-100
Intra Cellular Fluorescence for Monitoring The Physiological Changes and Biostimulation of Yeast Irradiated with Low Power 532nm CW Nd:YAG Laser
...Show More Authors

The purpose of this study is to investigate the biostimulation effect of 532 nm CW laser on the metabolism of Saccharomyces cerevisiae yeast. Cells were irradiated by 532 nm Nd:YAG laser using 0.153 W/cm2 power density at 30, 45, 60,180 and 300 seconds exposure times in their respective orders. Intrafluorescence parameters were measured by detection the autofluorescence intensity, proliferation rate and Imaging the fluorescent mitochondria using confocal laser scanning microscope. The results showed that the 30 and 45 second exposure times seem to have stimulated changes in the cells that led to increase proliferation, viability and mitochondrial activity. Autofluorescence of cells increased after 45 and 60 seconds exposure time. After 300 seconds there seems to be very noticeable decrease in proliferation, viability and autofluorescence. Confocal microscopy images showed that here is a correlation between fluorescence intensity using mitochondrial probes and proliferation rates of cells.
Introduction
Saccharomyces cerevisiae is one of the most important fungi in the history of the world. This yeast is responsible for the production of alcoholic beverages and bread and a source of protein and was used in biotechnology and genetics as a host for the genes of other organisms (Madigan, et al. 2006). Low energy laser irradiation of which output power is in the range of mW modulates various biological effects and has been shown to have positive effect on living organisms both in vitro and in vivo. However, the true effect of low energy laser on cell proliferation is sill controversial, because of conflicting reports on the effects of visible laser light on the cells in culture (Antonio, et al., 2002).
There are many evidences that the most intracellular autofluorescence

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Propagation Mechanisms for Surface Initiated Cracking in Composite Pavements
...Show More Authors

The primary objective of this study was to identify the mechanisms for the development and propagation of longitudinal cracks that initiate at the surface of composite pavement. In this study the finite element program ANSYS version (5.4) was used and the model worked out using this program has the ability to analyze a composite pavement structure of different layer properties. Also, the aim of this study was modeling and analyzing of the composite pavement structure with the physical presence of crack induced in concrete underlying layer. The results obtained indicates that increasing the thickness of the asphalt layer tends to decrease the stress intensity factor, which may be attributed to the rapidly decrease of horizontal tensile st

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Kinetic Model for Solute Diffusion in Liquid Membrane Systems
...Show More Authors

In this study, a mathematical model for the kinetics of solute transport in liquid membrane systems (LMSs) has been formulated. This model merged the mechanisms of consecutive and reversible processes with a “semi-derived” diffusion expression, resulting in equations that describe solute concentrations in the three sections (donor, acceptor and membrane). These equations have been refined into linear forms, which are satisfying in the special conditions for simplification obtaining the important kinetic constants of the process experimentally.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
2015 9th Malaysian Software Engineering Conference (mysec)
Factors for communication technologies selection within virtual software teams
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Proposed Audit Program for Automated Clearing House System (ACH)
...Show More Authors

إن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة  بين  المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ

... Show More
View Publication
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Al-arbaeen Al-boldniy for Ibin Asker Historical Study
...Show More Authors

Fortieth book is IbnAssaker mechanisms of modern books authored attention appeared amenable to the Messenger of Allah's will (Fife da upon h-d) in his emotional tempting scientists say despite his weakness and preached it save forty Hadith of year necessitated intercession and entering heaven eh Fife FA scientists 1940s h.g. Gae updated combines forty Hadith on a particular topic, authored destinations differed and collected and compiled, the first item in the 1940s that Abdul Rahman Abdullah ibn al-mubaarakmarvzishaikAssaker promised more than thirty workbook in this kind of composition topics varied between consolidation and conversations prove the Almighty Barry qualities, conversations provisions, worship, preaching, and of them only

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus
Publication Date
Thu Sep 01 2022
Journal Name
Iraqi Journal Of Computers, Communications, Control And Systems Engineering
A Framework for Predicting Airfare Prices Using Machine Learning
...Show More Authors

Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Energy Calculation for Excited Lithium Atom in Position Space
...Show More Authors

The energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 06 2019
Journal Name
Karbala International Journal Of Modern Science
Stereo Photogrammetry vs Computed Tomography for 3D Medical Measurements
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More