Preferred Language
Articles
/
shYEdYcBVTCNdQwCnFJg
Newcastle disease virus, rituximab, and doxorubicin combination as anti-hematological malignancy therapy
...Show More Authors

Hematological malignancies are important diseases that need more powerful therapeutics. Even with current targeting therapies, such as rituximab and other chemotherapeutic agents, there is a need to develop new treatment strategies. Combination therapy seems the best option to target the tumor cells by different mechanisms. Virotherapy is a very promising treatment modality, as it is selective, safe, and causes cancer destruction. The Iraqi strain of Newcastle disease virus (NDV) has proved to be effective both in vitro and in vivo. In the current work, we tested its ability on anti-hematological tumors and enhanced current treatments with combination therapy, and studied this combination using Chou–Talalay analysis. p53 concentration was measured to evaluate the mechanism of this proposed synergism. The results showed that NDV was synergistic with doxorubicin in low doses on plasmacytoma cells, with no involvement of p53 pathways, but involved p53 when the combination was used on non-Hodgkin lymphoma cells. NDV in combination with rituximab showed enhanced cytotoxicity that was p53-independent. In conclusion, this work proposes a novel combination modality for treatment of some hematological malignancies.

Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Synthesized 2nd Generation Zeolite as an Acid-Catalyst for Esterification Reaction
...Show More Authors

MCM-48 zeolites have unique properties from the surfaces and structure point of view as it’s shown in the results ,and unique and very sensitive to be prepared, have been experimentally prepared and utilized as a second-generation/ acid - catalyst for esterification reactions of oleic acid as a model oil for a free fatty acid source with Ethanol. The characterization of the catalyst used in the reaction has been identified by various methods indicating the prepared MCM-48 is highly matching the profile of common commercial MCM-48 zeolite. The XRF results show domination of SiO2 on the chemical structure with 99.1% and  agreeable with the expected from MCM-48 for it's of silica-based, and the SEM results show the cubic c

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Mar 24 2020
Journal Name
Mintage Journal Of Pharmaceutical & Medical Sciences
CD44 AS A TUMOR MARKER DIAGNOSTIC, THE ROLE IN CANCER PROGRESSION
...Show More Authors

Publication Date
Sun Sep 01 2024
Journal Name
Rafidain Journal Of Science
Therapeutic Potential of Bacterial Pigments as Antimicrobial Agents A Review Article
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 17 2016
Journal Name
2016 Asabe International Meeting
THE PERFORMANCE OF FARM TRACTORS AS REPORTED BY CAN-BUS MESSAGES
...Show More Authors

View Publication
Scopus (16)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
College Of Islamic Sciences
Weighting between the texts as the ruling when Imam Al-Salmi
...Show More Authors

abstract:

Objectives: The study aims to reveal the approach of Imam Al-Salmi in the weighting between the apparently conflicting texts, and to show the extent of his agreement and disagreement with the rest of the fundamentalists, and does he have vocabulary that can be used to elicit legal rulings in modern contemporary issues?

Method: The method of induction and analysis is one of the main tools to reach the research results. The study resorted to following the sayings of Imam Al-Salmi in various sources and fatwas and standing on them, then analyzing and applying them to the various branches of jurisprudence in the various jurisprudential chapters.

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Acta Facultatis Medicae Naissensis
Asthma as a risk factor for The progression of COVID-19
...Show More Authors

Background: Asthma is one of the most common chronic respiratory diseases in the world, standing for the most frequent cause for hospitalization and emergency cases. Respiratory viruses are the most triggering cause. Aim: To assess the role of viral infections, especially COVID-19, in the pathogenesis of asthma initiation and exacerbations. Method: Electronic search was done for the manuscripts focusing on asthma as a risk factor for complications after COVID-19 infection. The outcomes were titles, materials, methods and classified studies related or not related to the review study. Three hundred publications were identified and only ten studies were selected for analysis. Seven studies were review, one retrospective, one longitudin

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Design contexts in interior space design (sewing workshops as a model)
...Show More Authors

The topic of context is one of the important topics, which was mentioned as a concept in several fields and different fields, and there were many points of view that defined that concept.
He specified the title of the research (design contexts in the design of the interior space), as the research sought to identify the concept of context in the interior design of the spaces of sewing workshops. The research was divided into four chapters:
The first chapter, which consists of the methodological framework, the problem of research and the need for it, the importance of research, the goal and limits of research for sewing workshops for vocational schools from (2020-2021).
The second chapter: consists of previous studies and the theo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Revue Académique De La Recherche Juridique
Humanizing Legal Rules (The Winter Truce in France as a Model)
...Show More Authors

Since the law is the tool for implementing the state’s public policies, it is natural that its provisions (or at least some of them) seek to preserve human dignity as the source on which all rights and freedoms are based. One of the examples of humanizing the provisions of the law in France is what is known as the winter truce. What is this truce, what are the justifications for granting it, what is its historical origin, how did the legislative treatment of it develop, what are the similarities and differences between it and other legal periods included in French law, what is the scope of its application, and what are the effects resulting from it. These questions and others are what we will try to answer through this research.

View Publication