New evidence on nanotechnology has shown interest in the creation and assessment of nanoparticles for cancer treatment. Worldwide, a wide range of tumor-targeted approaches are being developed to reduce side effects and boost the efficacy of cancer therapy. One strategy that shows promise is the use of metallic nanoparticles to increase the radio sensitization of the cancer cells while reducing or maintaining the normal tissue complication probability during radiation therapy. In this study, atmospheric plasma was created using argon gas to create Au NPs using the plasma jet scheme, and their ability to induce apoptosis as an anticancer mechanism was tested. Aqueous gold tetrachloride salts (HAuCl4·3H2O) ere used to produce gold nanoparticles. For conformations, various techniques were used to explore the characterization of Au NPs, included UV–Vis spectroscopy, X-Ray Diffraction (XRD), Field Emission Scanning Electron Microscopy (FE-SEM),). UV–vis spectroscopy showed a maximum absorption peak located between 520 and 530 nm. The peaks of XRD 2θ are observed at 38.8°, 44.47°, 64.4° and 77.17°. They correspond to the 111, 200, 220 and 311 crystalline levels respectively. The peak intensity (111) at 38.8° diffraction was maximum peak. the image of FESEM showed that the Au NPs which produced are irregularly shaped spheres with sizes ranging between 41-46 nm. The effect of nanoparticles on REF normal cell lines was studied to calculate cytotoxicity and the greatest rate of destruction of REF normal cell lines was 22.667% after incubation time 72 hour after exposure to the combination of irradiated gold nanoparticles-cisplatin with 50 Gray photon X-ray and 1 µg of cisplatin and the minimum was 0.7% after incubation time 24 hour after exposure to the combination of irradiated gold nanoparticles-cisplatin with 0.5 Gray photon x-ray and 0.025 µg of cisplatin. Its possible to enhance chemotherapy treatment by these nanoparticles, In the future these techniques will be possible to use for kill cancer cells, especially after showed low toxicity on normal cells.
Glaucoma is one of the most dangerous eye diseases. It occurs as a result of an imbalance in the drainage and flow of the retinal fluid. Consequently, intraocular pressure is generated, which is a significant risk factor for glaucoma. Intraocular pressure causes progressive damage to the optic nerve head, thus leading to vision loss in the advanced stages. Glaucoma does not give any signs of disease in the early stages, so it is called "the Silent Thief of Sight". Therefore, early diagnosis and treatment of retinal eye disease is extremely important to prevent vision loss. Many articles aim to analyze fundus retinal images and diagnose glaucoma. This review can be used as a guideline to help diagnose glaucoma. It presents 63 artic
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This research test the relationship and the effect of an explanatory variable transparency in the organizational reputation responder variable by senior management in the departments of the Ministry of Housing and Construction centrally funded, As well as come out among other recommendations contribute to the achievement of organizational reputation of the organizations surveyed. Given the importance of the research topic for the public sector and the community and the environment in which they operate researcher designed questionnaire containing (30) items, and collected data from (92) respondents, representing the research community (eight establishments) exclusively and comprehensively, relying descriptive analytic
... Show MoreIt is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.
The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th
... Show MoreFeature selection, a method of dimensionality reduction, is nothing but collecting a range of appropriate feature subsets from the total number of features. In this paper, a point by point explanation review about the feature selection in this segment preferred affairs and its appraisal techniques are discussed. I will initiate my conversation with a straightforward approach so that we consider taking care of features and preferred issues depending upon meta-heuristic strategy. These techniques help in obtaining the best highlight subsets. Thereafter, this paper discusses some system models that drive naturally from the environment are discussed and calculations are performed so that we can take care of the prefe
... Show MoreA fault is an error that has effects on system behaviour. A software metric is a value that represents the degree to which software processes work properly and where faults are more probable to occur. In this research, we study the effects of removing redundancy and log transformation based on threshold values for identifying faults-prone classes of software. The study also contains a comparison of the metric values of an original dataset with those after removing redundancy and log transformation. E-learning and system dataset were taken as case studies. The fault ratio ranged from 1%-31% and 0%-10% for the original dataset and 1%-10% and 0%-4% after removing redundancy and log transformation, respectively. These results impacted direct
... Show MoreLet Y be a"uniformly convex n-Banach space, M be a nonempty closed convex subset of Y, and S:M→M be adnonexpansive mapping. The purpose of this paper is to study some properties of uniform convex set that help us to develop iteration techniques for1approximationjof"fixed point of nonlinear mapping by using the Mann iteration processes in n-Banachlspace.
Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con
... Show MoreHand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show More