Preferred Language
Articles
/
ijs-7432
Preparation of Nanoliposomes by Size Exclusion Chromatography to Entrap Soluble Antigens from Leishmania Donovani
...Show More Authors

In this study, we investigated the ability of nanoliposomes preparation, as a nanoadjuvant, to entrap soluble Leismania donovani antigens (SLAs) and release in vitro. The parasite reactivation was carried out when inoculated into Rosewell park memorial institute media (RPMI) and incubated at 23 °C for 4 days. L. donovani promastigote inoculum (104 cell / ml) of 4 days was used to inoculate modified medium of Saline - Neopeptone and Blood agar 9 (SNB 9) to produce promastigote mass. SLAs were extracted from the promastigotes ghost membrane after fourth passages of subculturing in SNB. The membrane pellet obtained was suspended in 5 mM Tris buffer (pH 7.6) and sonicated three times at 4 °C and entrapped in freshly prepared nanoliposomes. Lipids mixture of 4mM Phosphatidylcholine, 2.2 mM Cholesterol and 0.55 mM Phosphatidylethanolamine in a ratio of 7:2:1 were used to prepare nanoliposome. Physio-chemical characterizations of prepared nanoliposomes was performed by using Scanning Electron Microscope (SEM) , Atomic Force Microscope (AFM) and Zeta Potential assays to determine the size, morphology and charge. The efficiency of freshly prepared nanoliposoms to entrap SLAs was determined by measuring the nanoliposome efficiency entrapment (EE). The percentage of EE was 50 and 27.5 of SLAs entrapped nanoliposomes prepared by Sephadex G25 and Sephadex G75, respectively. Moreover, stability of SLAs entrapped nanoliposomes was examined at 4 and 37 °C as a storage temperature.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Contemporary Mathematical Sciences
Pre-Topology Generated by the Short Path Problems
...Show More Authors

Let G be a graph, each edge e of which is given a weight w(e). The shortest path problem is a path of minimum weight connecting two specified vertices a and b, and from it we have a pre-topology. Furthermore, we study the restriction and separators in pre-topology generated by the shortest path problems. Finally, we study the rate of liaison in pre-topology between two subgraphs. It is formally shown that the new distance measure is a metric

Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Solving Fuzzy Differential Equations by Using Power Series
...Show More Authors

In this paper, the series solution is applied to solve third order fuzzy differential equations with a fuzzy initial value. The proposed method applies Taylor expansion in solving the system and the approximate solution of the problem which is calculated in the form of a rapid convergent series; some definitions and theorems are reviewed as a basis in solving fuzzy differential equations. An example is applied to illustrate the proposed technical accuracy. Also, a comparison between the obtained results is made, in addition to the application of the crisp solution, when the-level equals one.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jun 06 2017
Journal Name
International Journal Of Science And Research (ijsr)
Facing Uncertainty Dimensions by Depending on Strategic Conversation,
...Show More Authors

The research starts from a fundamental problem about how top management team can realize the uncertainty. Strategic conversation has been introduced as a way for top management team to deal with uncertainties. Within the current research model, the strategic conversation was considered as an independent variable and uncertainty as dependent variable. The researcher used the survey method by distributed a questionnaire in the Administration and Economics College, University of Baghdad. Samples are 40 faculty participant of scientific committee members were distributed in seven scientific departments. The data were statistically analyzed by mean and the standard deviation. The hypotheses were tested through the use of correlation and regressi

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Publication Date
Fri Jul 26 2024
Journal Name
Academia Open
Enhancing Pediatric Nursing Skills by Top Learning Strategies
...Show More Authors

Background: The efficacy of educational strategies is crucial for nursing students to competently perform pediatric procedures like nasogastric tube insertion. Specific Background: This study evaluates the effectiveness of simulation, blended, and self-directed learning strategies in enhancing these skills among nursing students. Knowledge Gap: Previous research lacks a comprehensive comparison of these strategies' impacts on skill development in pediatric nursing contexts. Aims: The study aims to assess the effectiveness of different educational strategies on nursing students' ability to perform pediatric nasogastric tube insertions. Methods: A pre-experimental design was employed at the College of Nursing, University of Baghdad, i

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Intelligent Systems And Computing
Forecasting by Using the Optimal Time Series Method
...Show More Authors

View Publication
Scopus (15)
Crossref (5)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Solving Fuzzy Games Problems by Using Ranking Functions
...Show More Authors

In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Caps by Groups Action on the PG(3,8)
...Show More Authors

In this paper, the -caps are created by action of groups on the three-dimensional projective space over the Galois field of order eight. The types of -caps are also studied and determined either they form complete caps or not.

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Jan 10 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Enhancement the Educational Technology by Using 5G Networks
...Show More Authors

With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s

... Show More
View Publication
Scopus (30)
Crossref (8)
Scopus Crossref