Preferred Language
Articles
/
vBfaZ48BVTCNdQwCmXaq
Detection of Anti-cancer Activity of Silver Nanoparticles Synthesized using Aqueous Mushroom Extract of Pleurotus ostreatus on MCF-7 Human Breast Cancer Cell Line
...Show More Authors

     In this research, silver nanoparticles (AgNPs) were manufactured using aqueous extract of mushroom Pleurotus ostreatus. Anticancer potential of AgNPs was investigated versus human breast cancer cell line (MCF-7). Cytotoxic response was assessed by MTT assay. AgNPs showed inhibition effect at the following concentrations 12.5, 25, 50, 100 and 200 µg/ml versus MCF-7 cell line, and all treatments had a positive result. The MCF-7 cells were inhibited up to 85.14 % at the concentration 200 μg/ml of AgNPs which reduced cells viability to 14.86%, while 12.5 μg/ml of AgNPs caused 24.23% cells inhibition with reduction of cells viability to 75.77%.

Scopus Crossref
View Publication
Publication Date
Sat Nov 04 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis, Characterization, Anti-Inflammatory, and Antimicrobial Evaluation of New 2-Pyrazolines Derivatives Derived from Guaiacol
...Show More Authors

Abstract:         Chalcones were used to synthesis series of 2-pyrazoline derivatives and evaluated their antimicrobial and anti-inflammatory activities        (E)-1,3-diphenylprop-2-en-1-one (1-5) were synthesized by Claisen-Schmidt Condensation method through the reaction of acetophenone with five various para substituted benzaldehyde in presence of KOH, the reaction monitoring by TLC and the result intermediates were checked by melting point and FT-IR Various 2-Pyrazoline derivatives were prepared by one pot reaction that involved the refluxing of (E)-1,3-diphenylprop-2-en-1-one (1–5) and Hydrazine monohydrate in the presence of glacial acetic acid for 24 hours at a temperature of (45–50) °C fo

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Biotechnology Research Center
Evaluation of anti Epstien-Barr Virus antibodies in female patients with autoimmune hepatitis type-1
...Show More Authors

Epstein-Barr Virus (EBV) infection is associated with broad spectrum of clinical manifestationsdepending on the immune status of the host, To analyze their possible role in the complication ofautoimmune hepatitis, we investigated (30) female patients with autoimmune hepatitis type-1 of(10-40)years and 25 healthy female of same ages(control groups). Both groups were carried outto measure the levels of EBV-CA IgM, IgG Ab, EBV-EA IgM, IgG Ab, and EBV-NA IgM, IgGAb using indirect immunoflourescent assay (IFAT).The prevalence of EBV-CA IgM, IgG Ab were(10%,20%) and EBV-EA IgM, IgG Ab were (10% and20%) respectively, while the prevalence ofEBV-NA IgG Ab was( 3.33%) and there are no prevalence of EBV-NA IgM Ab. There weresignificant differences (P

... Show More
Publication Date
Thu Sep 01 2022
Journal Name
Natural Product Research
Synthesis, molecular docking and anti-inflammatory evaluation of new trisubstituted pyrazoline derivatives bearing benzenesulfonamide moiety
...Show More Authors

View Publication
Scopus (11)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Synthesis and Characterization of Gold Nanoparticles by Aluminum as a Reducing Agent
...Show More Authors

             The synthesis of nanoparticles (GNPs) from the reduction of HAuCl4 .3H2O by aluminum metal was obtained in aqueous solution with the use of Arabic gum as a stabilizing agent. The GNPs were characterized by TEM, AFM and Zeta potential spectroscopy. The reduction process was monitored over time by measuring ultraviolet spectra at a range of λ 520-525 nm. Also the color changes from yellow to ruby red, shape and size of GNP was studied by TEM. Shape was spherical and the size of particles was (12-17.5) nm. The best results were obtained at pH 6.

View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref