Rapid development has achieved in treating tumor to stop malignant cell growth and metastasis in the past decade. Numerous researches have emerged to increase potency and efficacy with novel methods for drug delivery. The main objective of this literature review was to illustrate the impact of current new targeting methods to other previous delivering systems to select the most appropriate method in cancer therapy. This review first gave a brief summary of cancer structure and highlighted the main roles of targeting systems. Different types of delivering systems have been addressed in this literature review with focusing on the latest carrier derived from malarial protein. The remarkable advantages and main limitations of the later have been also discussed. PubMed and Science Direct were the main search engines that have been used as information sources to prepare this review. Articles related to cancer targeting system, active and passive processes, current nanoparticles, antibody carriers, and current novel cancer carriers were used as sources in this review. Important points from many references published in the last decade (2008-2018) were selected and included. Several targeting methods were introduced to enhance the efficacy and tolerability of the toxic drug by active and passive processes, but there is still no conclusive carrier without certain drawbacks. A combination of targeting methods probably shows the most appropriate choice for increasing selectivity and safety of anticancer drugs via reducing the concentration of carriers used.
A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
The first aim of this paper was to evaluate the push-out bond strength of the gutta-percha coating of Thermafil and GuttaCore and compare it with that of gutta-percha used to coat an experimental hydroxyapatite/polyethylene (HA/PE) obturator. The second aim was to assess the thickness of gutta-percha around the carriers of GuttaCore and HA/PE obturators using microcomputed tomography (
In this study, a total of 209 individuals of leeches were collected from Al-Hindyia River / Babil Province. 116 individuals were identified as Erpobdella octaculata (Linnaeus, 1758), 50 individuals as Erpobdella punctata (Leidy,1870) and 43 individuals as Hemiclepsis marginata (Müller, 1774). Four samples were collected monthly during a period from February to June 2018. Some physical and chemical water properties were also examined, including air and water temperature, potential of hydrogen pH, Electrical Conductivity EC, Total Dissolved Solid TDS, Dissolved Oxygen DO, and the Biological Oxygen Demand BOD₅. Air and water temperature were r
... Show MoreCadmium has been known to be harmful to human healthy , manily Via contaminated drinking water , food supplies , tobacco and industrial pollutant . The aim of this study was to determine the toxicity of new Cadmium (II) complex ( Bis[ 5- ( P- nitrophenyl ) – ? 4 – Phenyl- 1,2,4- triazole -3- dithiocarbamatohydrazide] cadmium (II) Hydra ( 0.5) and compare it with anticancer drug cyclophosphamide ( CP) in female albino mice . This complex causes to several alterations in Enzymatic activity of Glutamate Pyruvate Transaminase (GPT) and Alkaline Phosphatase (ALP ) in three organs after the treatment of mice with different doses of a new cadmium (II) complex ( 0.09 / 0.25ml , 0.18/ 0.5ml and 0.25mg /0.7 ml /30 gm of mous
... Show MoreThis research aims to identify the relationship between occupational hypocrisy and organizational strategic success, It was done by analyzing the correlations and influence between variables, applied to a random sample of university professors at the University of Kufa faculty of administration and economic.
The main tool for data collection is the survey were questionnaires were distributed randomly to the professors , and (43) questionnaires were returned, and test its validity by using (SEM) (Structural Equation Modeling), Hypothesis has been tested by using Statistical Package for Social Sciences (SPSS v. 18), The research found a set of conclusions:(The occupational hypocrisy has
... Show MoreIn recent years, the attention of researchers, governments and international non-governmental organizations has focused on the aggressive practices adopted by companies with the aim of evading the tax burden or from paying the tax obligations imposed on them by law, as the results of these practices are negatively affected by tax revenues. And that companies are part of the society in which they work, and they have rights and obligations, including paying taxes. The research community is the Iraqi private shareholding companies, and the research sample was 4 companies within the private sector and in the field and finance - banking, insurance, industrial and service, which are Ashur Bank, Al-Ahlia Insurance Company, Baghdad Soft
... Show MoreIn recent years, the attention of researchers, governments and international non-governmental organizations has focused on the aggressive practices adopted by companies with the aim of evading the tax burden or from paying the tax obligations imposed on them by law, as the results of these practices are negatively affected by tax revenues. And that companies are part of the society in which they work, and they have rights and obligations, including paying taxes. The research community is the Iraqi private shareholding companies, and the research sample was 4 companies within the private sector and in the field and finance - banking, insurance, industrial and service, which are Ashur Bank, Al-Ahlia Insurance Company, Baghdad Soft
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More