Preferred Language
Articles
/
jkmc-798
A Role of Therapy that Targets Immune Checkpoint Proteins for the Treatment of Melanoma Brain Metastasis, Liver, Breast, Pancreatic Cancer and Pancreatic Adenocarcinoma
...Show More Authors

Checkpoint inhibitors are a type of immune therapy used to treat different types of cancers. These drugs block different checkpoint proteins, for example, CTLA-4, PD-1, and PD-L1 inhibitors.

They block proteins that stop the immune system from attacking the cancer cells.  Checkpoints are also described as a type of monoclonal antibody that antagonizes binding between B7 to CTLA-4 and PD-L1 to PD-1.

 Immune checkpoint inhibitors are used to treat BARCA mutated triple-negative breast cancer (TNBCS) in patients who do not respond to chemotherapy, and also in the treatment of highly mutated and solid tumors such as brain tumors, liver, and pancreatic cancers.

Immune checkpoint inhibitors exhibit an effect on solid tumors by suppressing CTLA-4, PD-1, and PDL-1. Anti-PD-1 is less toxic than anti-CTLA-4.

For melanoma Brain metastasis immune checkpoint therapy is more effective and Combination therapy has great efficacy and less toxicity which improves overall survival rather than individual therapy

liver cancer as hepatocellular carcinoma and cholangiocarcinoma used treatment with Genetics based therapy while using alternative immune checkpoint ligands, co-inhibitory (eg. LAG-3) or decreased t-cell infiltration causing therapy failure.

Clinical studies for pancreatic cancer have not been completed yet and treating PDA needs more research as immune checkpoint inhibitors is a new treatment against  PDA. A new potent class of nivolumab, pembrolizumab, and ipilimumab have been FDA approved.

For mutated tumors, Combination therapy between checkpoint inhibitors and chemotherapy has great efficacy and improves the city of life and overall survival, rather than individual therapy when using radiation or chemotherapy alone.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The phenomenon of Corruption and its impact on the growing problem of Unemployment in Iraq after a year ( 2003 ).
...Show More Authors

        Corruption is a phenomenon that exists in all times and places, they appear in the developing countries and in developed countries, and in all political systems. And its repercussions and economic repercussions on the society in which it is rampant, and lead to the undermining of economic development and obstruction, is also working on increasing poverty and unemployment, as well as its role in the worsening of social problems, and political instability. And corruption is deviant behavior is illegal and contrary to the teachings of the religious and moral values. The emergence of this phenomenon is due to several reasons, including political, economic, social and cultura

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
The A Comparative Study of the Adsorption of Crystal Violet Dye from Aqueous Solution on Rice Husk and Charcoal
...Show More Authors

            In this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
The A Comparative Study of the Adsorption of Crystal Violet Dye from Aqueous Solution on Rice Husk and Charcoal
...Show More Authors

n this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best. The effect of temperature on the adsorption process was studied

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte
THE IMPACT OF ENGINEERING ANXIETY ON STUDENTS: A COMPREHENSIVE STUDY IN THE FIELDS OF SPORT, ECONOMICS, AND TEACHING METHODS
...Show More Authors

Scopus (24)
Scopus
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
The effectiveness of change and transformation of formal displacement in the internal space (historical passenger stations as a model)
...Show More Authors

Intellectual and material displacement is one of the design strategies through many mechanisms and means, and depends on the idea of changing the shape within the internal spaces at times and has concepts related to the transformation at other times. And represented by the boxes for travelers, the research problem emerged through the following question: (What is the effectiveness of displacement in the formal structures in the interior design of historical sites), and the aim of the study is to reveal the reality of the use of historical internal spaces and to determine the formal displacement that occurs as a result of change and transformation, and it included two topics, the first topic Transformation and the effectiveness of formal d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
The Reality of Alternative Assessment for Teachers of the First Cycle of the Basic Education in the Sultanate of Oman: Use, Self-Efficacy, and Attitude
...Show More Authors

This study aims at identifying the reality of alternative assessment for teachers of the first cycle of the basic education in the Sultanate of Oman with respect to the degree of teachers' use of alternative assessment strategies, level of self-efficacy for alternative assessment strategies, and attitude towards alternative assessment, and their relationship with other variables. To achieve the aims of the study, a descriptive research approach was utilized. A 5-point self-rated questionnaire was developed. It consists of three sections: Actual use of alternative assessment strategies (21 items), self-efficacy for alternative assessment strategies (21 items), and attitude towards alternative assessment (27 items). The psychometric proper

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sun Mar 31 2024
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Using Solid Waste as A Substitute for Raw Materials in Construction: A Review.
...Show More Authors

The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative

... Show More
View Publication
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref