Preferred Language
Articles
/
SxgRkpYBVTCNdQwC8IWO
AN INSIGHT ON THE IDENTIFICATION OF CANCER STEM CELLS USING NOVEL IMMUNOLOGICAL AND MOLECULAR STRATEGIES
...Show More Authors

Cancer stem cells (CSCs) are defined as a population of cells present in tumours, which can undergo self-renewal and differentiation. Identification and isolation of these CSCs using putative surface markers have been a priority of research in cancer. With this background we selected pancreatic normal and tumor cells for this study and passaged them into animal tissue culture medium. Further staining was done using alkaline phosphatase and heamatoxilin staining. Blue to purple colored zones in undifferentiated pluripotent stem cells and clear coloration in the chromatin material indicated pancreatic cells. Further studies on the cell surface marker CD 44 were done using ELISA. For this, the protein was extracted from cultivated normal and tumor pancreatic cells and absorbance was taken in ELISA reader. However, there was no significant difference in optical density values obtained with normal and tumor pancreatic cells indicating further studies are required for upregulation of CD44 in tumor cells. Reverse Transcriptase-polymerase chain reaction (RT-PCR) amplification of insulin growth factor binding protein 5 (IGF-BP5), showed negative result with pancreatic tumor, indicating there is no gene expression in tumor cell.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 15 2013
Journal Name
Asian Journal Of English Studies
Strategies of Politeness in English Medical Conversations
...Show More Authors

BN Rashid, Ajes: Asian Journal of English Studies, 2013

View Publication
Publication Date
Fri May 01 2015
Journal Name
2015 Ieee Congress On Evolutionary Computation (cec)
Differential evolution with adaptive repository of strategies and parameter control schemes
...Show More Authors

A new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reli

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
The Patterns of the Strategic Environment and its Role in Determining Strategies for Dealing with Conflict and Peace Situations
...Show More Authors

Abstract

The decision maker needs to understand the strategic environment to be addressed through different means and methods. It is obvious that there is a difference between the three strategic environments (conflict environment, peace environment, post- peace environment) in terms of inputs and strategies to deal with each one of them. There is an urgent need to understand each pattern separately, analyze its inputs, and identify the factors and variables that affect the continuity of this situation (conflict, peace, post-peace). It is not appropriate to identify treatment without diagnosis of the condition, so it is very important to understand the type of strategic environment to be dealt with it.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparative study of logistic regression and artificial neural networks on predicting breast cancer cytology
...Show More Authors

<p>Currently, breast cancer is one of the most common cancers and a main reason of women death worldwide particularly in<strong> </strong>developing countries such as Iraq. our work aims to predict the type of tumor whether benign or malignant through models that were built using logistic regression and neural networks and we hope it will help doctors in detecting the type of breast tumor. Four models were set using binary logistic regression and two different types of artificial neural networks namely multilayer perceptron MLP and radial basis function RBF. Evaluation of validated and trained models was done using several performance metrics like accuracy, sensitivity, specificity, and AUC (area under receiver ope

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Sumer 4
CYTOTOXIC IMPACT OF OUTER MEMBRANE NANOVESICLES (OMVS) ON OVARIAN CANCER
...Show More Authors

This study focused on extracting the outer membrane nanovesicles (OMVs) from Escherichia coli BE2 (EC- OMVs) by ultracentrifugation, and the yield was 2.3mg/ml. This was followed by purification with gel filtration chromatography using Sephadex G-150, which was 2mg/ml. The morphology and size of purified EC-OMVs were confirmed by transmission electron microscopy (TEM) at 40-200 nm. The nature of functional groups in the vesicle vesicle was determined by Fourier transforms infrared spectroscopy (FT-IR) analysis. The antitumor activity of EC-OMVs was conducted in vitro by MTT assay in human ovarian (OV33) cancer cell line at 24,48 and 96hrs. The cytotoxicity test showed high susceptibility to the vesicles in ovarian compared to normal

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
Left Flank Pain and Hydronephrosis as the Initial Presentations of Advanced Gastric Cancer
...Show More Authors

Ureteric obstruction is rarely noted in cases of gastric cancer. Its involvement by distant metastasis from gastric adenocarcinoma without direct invasion is an exceptionally unusual occurrence. This is the story of a 58-year-old man who arrived at the emergency department with acute flank pain and fever. He was initially diagnosed with obstructive pyelonephritis after the discovery of a new onset, complete ureteric obstruction on the left side. Subsequent investigations and follow-up revealed the presence of gastric adenocarcinoma with possible ureteric metastasis bilaterally, flank pain and hydronephrosis were the first and only presentations of gastric cancer. The rarity of the condition and the unusual presentation encouraged us to r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 04 2020
Journal Name
Biochemical And Cellular Archives
MOLECULAR AND HEMATOLOGICAL STUDY OF TOXOPLASMA GONDII IN HORSES
...Show More Authors

Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Semilogy of the Narrative Structure in "Nisa'a Al Altabat" Novel: The Semilogy of the Narrative Structure in "Nisa'a Al Altabat" Novel
...Show More Authors

Abstruct
This recearch is about studying the novel (doorstep’s women) by the Iraqi
narrator Hadia Hussian, and I choose Semiolog as a Curriculum for this
critical approach, because I think that this Semiotic curriculum has the ability
to read the Subjects and the narrative constructions. Which form the structure
of the novel starting from the little to the characters.
The focus is on many narrative constructions in the novel we have
studied the semiology of the tittle, the semiology of the cover, of the color, the
names of the characters and the semiology of the female characters.
First the focus of the novel is on the women’s characters because most
of it’s characters are women. Secondly because these

... Show More
View Publication Preview PDF