Cancer disease has a complicated pathophysiology and is one of the major causes of death and morbidity. Classical cancer therapies include chemotherapy, radiation therapy, and immunotherapy. A typical treatment is chemotherapy, which delivers cytotoxic medications to patients to suppress the uncontrolled growth of cancerous cells. Conventional oral medication has a number of drawbacks, including a lack of selectivity, cytotoxicity, and multi-drug resistance, all of which offer significant obstacles to effective cancer treatment. Multidrug resistance (MDR) remains a major challenge for effective cancer chemotherapeutic interventions. The advent of nanotechnology approach has developed the field of tumor diagnosis and treatment. Cancer nanotechnology enables direct access to tumor cells, resulting in enhanced drug localization and cellular uptake. Since the early 1990’s, several solid lipid nanoparticle (SLN) or SLN-based systems for the delivery of cytotoxic drugs have been manufactured and tested with success. High shear homogenization, microemulsion-based SLN, Supercritical fluid technology, spray drying, and solvent emulsification/evaporation methods can all be used to successfully formulate SLN.There is great potential to enhance cancer chemotherapy by incorporating it into a solid lipid nanoparticle (SLN) drug delivery system. Improving tumor diffusivity, improvement of body distribution, and inhibiting MDR are the main attributes. This type of review article discusses advantages and disadvantages of SLNs, their production techniques, and their potential usage in the treatment of various cancers.
Modeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreConflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Language always conveys ideologies that represent an essential aspect of the world we live in. The beliefs and opinions of an individual or community can be organized, interacted with, and negotiated via the use of language. Recent researches have paid attention to bullying as a social issue. They have focused on the psychological aspect of bullying rather than the linguistic one. To bridge this gap, the current study is intended to investigate the ideology of bullying from a critical stylistic perspective. The researchers adopt Jeffries' (2010) critical stylistics model to analyze the data which is five extracts taken from Hunt’s Fish in a Tree (2015). The analysis demonstrates
... Show MoreObjectives: The aim of the study is to evaluate the information of caregivers concerned emergency care for the elderly and to identify the relationship between caregiver information and their educational level, years of service and training courses. Methodology: A quasi-experimental study was conducted in the Geriatric Care Home in Baghdad City (the governmental and private geriatric care home ) for the period from October, 14th , 2018 to March, 20th , 2019 to find the effectiveness of the instructional program on caregivers knowledge about emergency care for the elderly.. A purposive sample (non-probability) was consisting of (30) males and females caregivers, the sample was selected from geriatric care home in Baghdad city .To implemen
... Show MoreLasmiditan (LAS) was formulated as a nanoemulsion based in situ gel (NEIG)with the aim of improving its oral bioavailability via application intranasally. The solubility of LAS in oils, emulsifiers, and co-emulsifiers was determined to identify nanoemulsion (NE)components. Phase diagrams were constructed to identify the area of nanoemulsification. LAS NE was formulated using the spontaneous nanoemulsification method. Four NEs (F19, F24, F31, and F34) containing 7-15 % oleic acid (OA) as an oily phase, 40-55% labrasol (LR), and transcutol (TC) as emulsifier mixture at (1:1), (2:1), (3:1), and (1:2) ratio with 30-53 % (w/w) aqueous phase, having suitable optical transparency of 95–98%, globule size of 104-140 nm and polydisper
... Show MoreStatement of the Problem. The use of orthodontic fixed appliances may adversely affect oral health leading to demineralizing lesions and the development of gingival problems. Aims of the Study. The study aimed to coat orthodontic archwires with chlorhexidine hexametaphosphate nanoparticles (CHX-HMP NPs) and to evaluate the elusion of CHX from CHX-HMP NPs. Materials and Methods. A solution of CHX-HMP nanoparticles with an overall concentration of 5 mM for both CHX and HMP was prepared, characterized (using atomic force microscope and Fourier transformation infrared spectroscopy), and used to coat orthodontic stainless steel (SSW) and NiTi archwires (NiTiW). The coated segments were characterized (using scanning electron microscopy
... Show MoreThis study aimed at identifying the trend to applying the Joint Audit as an approach to improve the financial reports quality with all their characteristics (Relevance, Reliability, Comparability, Consistency), as well as enclose the difficulties that faced the auditors in the Gaza Strip in implementing the Joint Audit. In order to achieve the study aims, a measure was used to identify the trend to apply the Joint Audit and it was distributed to the study sample which is consisting of (119) individuals and retrieved thereof (99) valid for analysis, approximately (83.2%), (69) of them are Auditors, (30) financial managers and accountants. The researcher used the analytical descriptive method, and after analyzing the results, the s
... Show More