Gingival carcinoma is a malignant neoplasm affecting the oral mucosa and is associated with significant morbidity and mortality. Allium ampeloprasum var. porrum water extracts have gotten a lot of attention because of their bioactive components, such as polyphenols, flavonoids, and alkaloids, which have a variety of pharmacological activities, including antiproliferative actions. This study aimed to evaluate the histological and molecular effects of Allium ampeloprasum (leek) water extract on the proliferation of the murine gingival cancer cell line. Histological evaluation was conducted to examine morphological changes induced by extract treatment. Molecular mechanisms underlying the observed histological changes were investigated
... Show MoreAcute Respiratory Distress Syndrome (ARDS) is triggered by a variety of insults, such as bacterial and viral infections, including SARS-CoV-2, leading to high mortality. In the murine model of ARDS induced by Staphylococcal enterotoxin-B (SEB), our previous studies showed that while SEB triggered 100% mortality, treatment with Resveratrol (RES) completely prevented such mortality by attenuating inflammation in the lungs. In the current study, we investigated the metabolic profile of SEB-activated immune cells in the lungs following treatment with RES. RES-treated mice had higher expression of miR-100 in the lung mononuclear cells (MNCs), which targeted mTOR, leading to its decreased expression. Also, Single-cell RNA-seq (scRNA seq)
... Show MoreThe aim of this study was to evaluate the effects of local application of bisphosphonate gel and recombinant human bone morphogenic protein 2 gel, on titanium dental implant stability and marginal bone level. Twenty-seven patients with upper and lower missing posterior tooth/teeth were included in the study with a total of 71 implants that were used for rehabilitation. The implants were randomly divided into 4 groups: 3 study groups and 1 control. Group1; local application of bisphosphonate gel, group 2; local application of recombinant human bone morphogenic protein 2 gel, group 3; local application of a mixed formula of both gels. The gel application was immediately preimplant insertion, group 4; implant insertion without application of a
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreThe Gaussian orthogonal ensemble (GOE) version of the random matrix theory (RMT) has been used to study the level density following up the proton interaction with 44Ca, 48Ti and 56Fe.
A promising analysis method has been implemented based on the available data of the resonance spacing, where widths are associated with Porter Thomas distribution. The calculated level density for the compound nuclei 45Sc,49Vand 57Co shows a parity and spin dependence, where for Sc a discrepancy in level density distinguished from this analysis probably due to the spin misassignment .The present results show an acceptable agreement with the combinatorial method of level density.
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThe researchers have a special interest in studying Markov chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one of the ministries. Results are analyzed by applying Maximum likelihood estimation and Ordinary least squares methods resulting
... Show More