In this study, we set up and analyze a cancer growth model that integrates a chemotherapy drug with the impact of vitamins in boosting and strengthening the immune system. The aim of this study is to determine the minimal amount of treatment required to eliminate cancer, which will help to reduce harm to patients. It is assumed that vitamins come from organic foods and beverages. The chemotherapy drug is added to delay and eliminate tumor cell growth and division. To that end, we suggest the tumor-immune model, composed of the interaction of tumor and immune cells, which is composed of two ordinary differential equations. The model’s fundamental mathematical properties, such as positivity, boundedness, and equilibrium existence, are examined. The equilibrium points’ asymptotic stability is analyzed using linear stability. Then, global stability and persistence are investigated using the Lyapunov strategy. The occurrence of bifurcations of the model, such as of trans-critical or Hopf type, is also explored. Numerical simulations are used to verify the theoretical analysis. The Runge–Kutta method of fourth order is used in the simulation of the model. The analytical study and simulation findings show that the immune system is boosted by regular vitamin consumption, inhibiting the growth of tumor cells. Further, the chemotherapy drug contributes to the control of tumor cell progression. Vitamin intake and chemotherapy are treated both individually and in combination, and in all situations, the minimal level required to eliminate the cancer is determined.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreObjective: Zerumbone (ZER) is a well-known natural compound that has been reported to have anti-cancer effect. Thus, this study investigated the ZER potential to inhibit Thymidine Phosphorylase (TP) and the ability to trigger Reactive oxygen species (ROS)-mediated cytotoxicity in non-small cell lung cancer, NCI-H460, cell line. Material and Method: The antiangiogenic activity for ZER was evaluated by using the thymidine phosphorylase inhibitory test. Reactive oxygen species (ROS) production was determined via DCFDA dye by using flow cytometry. Result and Discussion: ZER was found to be potent TP inhibitory with the IC50 value of 50.3± 0.31 μg/ml or 230±1.42 µM. NCI-H460 cells upon treatment with ZER produced sign
... Show MoreObjective: Zerumbone (ZER) is a well-known natural compound that has been reported to have anti-cancer effect. Thus, this study investigated the ZER potential to inhibit Thymidine Phosphorylase (TP) and the ability to trigger Reactive oxygen species (ROS)-mediated cytotoxicity in non-small cell lung cancer, NCI-H460, cell line. Material and Method: The antiangiogenic activity for ZER was evaluated by using the thymidine phosphorylase inhibitory test. Reactive oxygen species (ROS) production was determined via DCFDA dye by using flow cytometry. Result and Discussion: ZER was found to be potent TP inhibitory with the IC50 value of 50.3± 0.31 μg/ml or 230±1.42 µM. NCI-H460 cells upon treatment with ZER produced sign
... Show MoreBackground: Excision repair cross-complementing group 2 gene (ERCC2) polymorphisms have been linked as being a risk factor for colorectal cancer (CRC) emergence. However, data from several studies are contradictory. To validate genetic biomarkers of the CRC; the impact of the following ERCC2 polymorphism (rs1799793 and rs238406) was examined on CRC susceptibility among sample of Iraqi population. Methods: A total of 126 subjects were enrolled in this case control study; 78 CRC patients and 48 apparently healthy individuals who are age, gender, smoking status and BMI matched. Polymerase chain reaction (PCR) was used for genotyping, followed by sequencing then the association between genetic polymorphisms and CRC risk was investigate
... Show MoreFire is one of the most critical risks devastating to human life and property. Therefore, humans make different efforts to deal with fire hazards. Many techniques have been developed to assess fire safety risks. One of these methods is to predict the outbreak of a fire in buildings, and although it is hard to predict when a fire will start, it is critical to do so to safeguard human life and property. This research deals with evaluating the safety risks of the existing building in the city of Samawah/Iraq and determining the appropriateness of these buildings in terms of safety from fire hazards. Twelve parameters are certified based on the National Fire Protection Association (NFPA20
The article critically analyzes traditional translation models. The most influential models of translation in the second half of the 20th century have been mentioned, among which the theory of formal and dynamic equivalence, the theory of regular correspondences, informative, situational-denotative, functional-pragmatic theory of communication levels have been considered. The selected models have been analyzed from the point of view of the universality of their use for different types and types of translation, as well as the ability to comprehend the deep links established between the original and the translation.
Аннотация
The Jeribe Formation, the Jambour oil field, is the major carbonate reservoir from the tertiary reservoirs of the Jambour field in northern Iraq, including faults. Engineers have difficulty organizing carbonate reserves since they are commonly tight and heterogeneous. This research presents a geological model of the Jeribe reservoir based on its facies and reservoir characterization data (Permeability, Porosity, Water Saturation, and Net to Gross). This research studied four wells. The geological model was constructed with the Petrel 2020.3 software. The structural maps were developed using a structural contour map of the top of the Jeribe Formation. A pillar grid model with horizons and layering was designed for each zone. Followin
... Show MoreGlobal warming has a serious impact on the survival of organisms. Very few studies have considered the effect of global warming as a mathematical model. The effect of global warming on the carrying capacity of prey and predators has not been studied before. In this article, an ecological model describing the relationship between prey and predator and the effect of global warming on the carrying capacity of prey was studied. Moreover, the wind speed was considered an influencing factor in the predation process after developing the function that describes it. From a biological perspective, the nonnegativity and uniform bounded of all solutions for the model are proven. The existence of equilibria for the model and its local stability is inves
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show More