Introduction and Aim: Cancers are a complex group of genetic illnesses that develop through multistep, mutagenic processes which can invade or spread throughout the body. Recent advances in cancer treatment involve oncolytic viruses to infect and destroy cancer cells. The Newcastle disease virus (NDV), an oncolytic virus has shown to have anti-cancer effects either directly by lysing cancer cells or indirectly by activating the immune system. The green fluorescent protein (GFP) has been widely used in studying the anti-tumor activity of oncolytic viruses. This study aimed to study the anticancer effect of a recombinant rNDV-GFP clone on NCI-H727 lung carcinoma cell line in vitro. Materials and Methods: The GFP gene was inserted to a NDV strain to create a recombinant NDV (rNDV- GFP) using reverse genetics technology. The MTT assay was used in evaluating the oncolytic effect of rNDV- GFP on the lung carcinoma NCI-H727 cells. Light and fluorescent microscopy was used to study the cytopathic effects of rNDV-GFP. Results: MTT assay showed that rNDV-GPF inhibited the NCI-H727 tumor cell death in a time-dependent manner. A significant inhibitory effect (78.3%) for rNDV-GPF on cancer cells was observed at 96h in comparison to rNDV (22.7%) and the cytotoxicity rate was directly proportional to the MOI used. Microscopic studies showed rNDV-GPF to induce cytopathic effect post 24 h of infection. Conclusion: The GFP-expressing recombinant NDV strains exhibited encouraging results in terms of tumor growth inhibition. Our research set the groundwork for employing recombinant NDV as an anticancer viral vector.
Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreRecently the use of nanofluids represents very important materials. They are used in different branches like medicine, engineering, power, heat transfer, etc. The stability of nanofluids is an important factor to improve the performance of nanofluids with good results. In this research two types of nanoparticles, TiO2 (titanium oxide) and γ-Al2O3 (gamma aluminum oxide) were used with base fluid water. Two-step method were used to prepare the nanofluids. One concentration 0.003 vol. %, the nanoparticles were examined. Scanning Electron Microscopy (SEM), Atomic Force Microscopy (AFM) and X-ray diffraction (XRD) were used to accomplish these tests. The stability of the two types of nanofluids is measured by
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThe parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.
The rise of antibiotic-resistant bacteria necessitates the exploration of novel antimicrobial agents. Yttrium oxide nanoparticles (Y₂O₃) have shown potential due to their unique physicochemical properties and antibacterial activities against various pathogens. This study investigates the cytotoxic and antibacterial effects of Y₂O₃ nanoparticles against Serratia fonticuli and Citrobacter koseri, bacteria isolated from cholangitis patients. Bacterial strains were isolated from bile specimens and confirmed using standard microbiological techniques. The methods of X-ray diffraction (XRD), (SEM), and Frequency transform-infrared spectroscopic (FT-IR) were used to characterize YO₃ particles. Using a microdilution technique, the minimum
... Show More