Preferred Language
Articles
/
kRcQW44BVTCNdQwCykSo
Breast cancer treatment using cold atmospheric plasma generated by the FE-DBD scheme
...Show More Authors

Background Cold atmospheric plasma (CAP) is widely used in the cancer therapy field. This type of plasma is very close to room temperature. This paper illustrates the effects of CAP on breast cancer tissues both in vivo and in vitro. Methods The mouse mammary adenocarcinoma cell line AN3 was used for the in vivo study, and the MCF7, AMJ13, AMN3, and HBL cell lines were used for the in vitro study. A floating electrode-dielectric barrier discharge (FE-DBD) system was used. The cold plasma produced by the device was tested against breast cancer cells. Results The induced cytotoxicity percentages were 61.7%, 68% and 58.07% for the MCF7, AMN3, and AMJ13 cell lines, respectively, whereas the normal breast tissue HBL cell line exhibited very little or no cytotoxicity. Reactive oxygen species (ROS) were measured, and we found that more ROS were generated under the impact of CAP in cancer cells, whereas the normal HBL cell line had the lowest ROS level. The in vivo study showed that CAP treatment could reduce the volume of treated tumors compared to those in untreated mice. Conclusions CAP has anticancer effects both in vitro and in vivo and this effect is mediated by the ROS and induce apoptosis in p53 independent pathway. the current method is promising for breast cancer therapy.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Diagnostic Potential Role of CXCL3 and Leptin Levels in Breast Cancer
...Show More Authors

The risk of breast cancer development is believed to be attributed to the alterations of a number of key biological components. Within this context, elevated levels of some chemokines that act as growth factors and can promote cancer development. The current study was designed to evaluate CXCL3 (a chemokine C-X-C Motif Ligand 3) and leptin (a peptide hormone synthesized by adipose tissue with cytokine activity) serum of Iraqi breast cancer patients in comparison to healthy controls. A total of 90 participants consisted of 60 patients diagnosed with breast cancer and 30 healthy women as control group were enrolled into this case-control study. Venous blood samples were collected from all participants to evaluate CXCL3 and leptin serum levels

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Current Research In Microbiology And Biotechnology
Serodiagnosis of Human Cytomegalovirus in Iraqi Breast cancer and fibroadenoma patients
...Show More Authors

Human cytomegalovirus (HCMV) has a worldwide distribution and extremely common infections. The presence of HCMV genome and antigens has been detected in many kinds of human cancers especially breast cancer. In Iraq, the incidence of breast cancer generally exceeds any other type of malignancies among Iraqi population. The study was performed in the period between October 2016 and June 2017 in Central public health laboratory/Baghdad. It involve samples from 90 women including 60 breast cancer patients, 20 benign tumor patients, and 10 normal breast tissues. A blood sample was obtained from each woman included in this study. Anti-HCMV IgG antibody was presented in 9/10 (90%) of normal women, benign breast tumor patients 19/20 (95%) and malig

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Iaes International Journal Of Artificial Intelligence
Reduced hardware requirements of deep neural network for breast cancer diagnosis
...Show More Authors

Identifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Fri Apr 26 2019
Journal Name
Journal Of Contemporary Medical Sciences
Breast Cancer Decisive Parameters for Iraqi Women via Data Mining Techniques
...Show More Authors

Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Gene Reports
Genotyping of Human Cytomegalovirus Glycoprotein N in Iraqi Breast cancer Patients
...Show More Authors

Human Cytomegalovirus (HCMV) is an enveloped ubiquitous ds-DNA virus that has been implicated in several types of malignancies. The current work was conducted in the period extending from (November 2018 to the end of October 2019) and aimed to assess the frequency of glycoprotein N (gN) genotypes of HCMV. A total number of 91serum and plasma specimens were collected to fulfill this purpose from females (71 breast cancer patients, and a control group of 20 females) attending Al-Amal hospital for cancer management and Baghdad teaching hospital. The molecular part of this data was achieved through both PCR and Multiplex PCR for detection of HCMV gN (UL73) entire gene as well as for genotyping. gN was detected in 36/71 (50.7%) of breast cancer

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Nov 08 2022
Journal Name
V. International Scientific Congress Of Pure, Applied And Technological Sciences
The effect of background vacuum pressure on the length of gas discharge plasma by using Aluminum electrodes
...Show More Authors

Length of plasma generated by dc gas discharge under different vacuum pressures was studied experimentally. The cylindrical discharge tube of length 2m was evacuated under vacuum pressure range (0.1-0.5) mbar at constant external working dc voltage 1500V. It was found that the plasma length (L) increased exponentially with increasing of background vacuum air pressure. Empirical equation has been obtained between plasma length and gas pressure by using Logistic model of curve fitting. As vacuum pressure increases the plasma length increases due to collisions, ionizations, and diffusions of electrons and ions.

Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Tue Sep 27 2022
Journal Name
Journal Of Engineering Research And Sciences
Images Compression using Combined Scheme of Transform Coding
...Show More Authors

Some problems want to be solved in image compression to make the process workable and more efficient. Much work had been done in the field of lossy image compression based on wavelet and Discrete Cosine Transform (DCT). In this paper, an efficient image compression scheme is proposed, based on a common encoding transform scheme; It consists of the following steps: 1) bi-orthogonal (tab 9/7) wavelet transform to split the image data into sub-bands, 2) DCT to de-correlate the data, 3) the combined transform stage's output is subjected to scalar quantization before being mapped to positive, 4) and LZW encoding to produce the compressed data. The peak signal-to-noise (PSNR), compression ratio (CR), and compression gain (CG) measures were used t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2011
Journal Name
Iraqi Journal Of Laser
Different Wavelength Femtosecond Laser Pulses Generated by Diode Pumped Ti: Sapphire Crystal
...Show More Authors

The relation between the output power and wavelengths for a 532nm 3W frequency doubled diode pumped solid state laser pumped Ti:Sapphire crystal is investigated. A 20 femtosecond pulse at 800 nm is obtained. A 320 mW is found to be the highest power at 800nm. Below this wavelength value and above the power was found to deviate from highest output value.

View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref