Preferred Language
Articles
/
bijps-877
The Prevalence of UGT1A1*93 and ABCC5 Polymorphisms in Cancer Patients Receiving Irinotecan-Based Chemotherapy at Al-Najaf Al-Ashraf
...Show More Authors

Irinotecan (CPT-11) is a semisynthetic derivative of the antineoplastic agent camptothecin used in a wide range as an anti-cancer agent in many solid tumors because of its cytotoxic effect through the interaction with the topoisomerase I enzyme. The major limiting factors for irinotecan treatment are its association with potentially life-threatening toxicities including neutropenia and acute or delayed-type diarrhea, results from distinct interindividual and interethnic variability due to gene polymorphism.

This is a cross sectional pharmacogentics study was conducted on 25 cancer patients to estimate the prevalence of UGT1A1*93 and ABCC5 allele single nucleotide polymorphism (SNP) in Iraqi cancer patients treated with irinotecan-based therapy at Middle Euphrates Cancer Center. Four drops of venous blood was drawn for each patient and was applied onto the FTA classic card to perform a genotyping assay for the 2 SNPs. After DNA isolation and purification, real time PCR was performed to detect the SNPs of each gene.

Results of this study showed the prevalence of one allele variant (heterozygous mutation) of UGT1A1*93 was 64% compared to 36% of patients were wild type to this SNP. No patient (0%) could be detected with homozygous polymorphism of the UGT1A1*93. For the ABCC5 polymorphism, results revealed that 32% of patients have one polymorphic allele (heterozygous), while 28% of them have two polymorphic alleles (homozygous mutation). Wild type ABCC5 gene constitutes 40% of patients.   As a conclusion, high prevalence of UGT1A1*93 and ABCC5 polymorphic alleles were detected in patients at Middle Euphrates Cancer Center which may explain the high toxicity features associated with irinotecan therapy. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation for 3-DoF SCARA Robot based PLC
...Show More Authors

Abstract 

This paper presents mechanical and electrical design, and implementation  process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Private Backend Server Software-Based Telehealthcare Tracking and Monitoring System
...Show More Authors

In these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso

... Show More
View Publication
Scopus (32)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact assessment of strategic goods on government grants and as a result of activity: An analytical study at the General Company of grain trading
...Show More Authors

  In Iraq,  government contributions to the public companies have become a very important aspect which contributes to the survival and sustainability of these institutions as it consider  one of the main sources of funding, if not it consider the basis of funding.

  According to  the vital roles assigned to these institutions to follow up, which usually  include important activities in the national economy, the research focused on studying the field reality of the method used in evaluating the stock of total production and purchases of goods for the purpose of selling the strategic commodities of the General Company for Grain Trade.  As a result, the aim of this study came to came to highlight&n

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Comparison of the Physical Trace of Global Luminosity Emission at Multiwavelength and Star Formation Rates of Luminous Infrared Galaxies Using Extragalactic Distance Scale Techniques
...Show More Authors

This paper aims to study the rate of star formation (SFR) in luminous infrared galaxies at different wavelengths using distance measurement techniques (dl, dm) and to know which methods are the most accurate to determine the rate of star formation as we present through this research the results of the statistical analysis (descriptive statistics) for a sample of luminous infrared galaxies. The data used in this research were collected from the NASA Extragalactic Database (NED) and HYPERLEDA, then used to calculate the star formation rate and indicate the accuracy of the distance methods used (dl, dm). Two methods were tested on Hα, OII, FIR, radio continuum at 1.4 GHz, FUV, NUV, and total (FUV + FIR). The results showed that the dl

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jun 18 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effect of Oral Administration of Valerian Extract at Different Doses on Pharmacokinetic Parameters of Carbamazepine in Rabbits
...Show More Authors

Carbamazepine (CBZ) is a narrow therapeutic index drug used in the treatment of trigeminal neuralgia and psychiatric disorders. Valerian (VAL) is a popular herbal product which should be prescribed to treat insomnia and anxiety. The study was designed to investigate the presence of significant pharmacokinetic (PK) interaction between Valerian (VAL) at different concentrations on Carbamazepine (CBZ) pharmacokinetic parameters in healthy male rabbits. In an in vivo, parallel-randomized controlled trial, the rabbits in three groups "first (control), second and third" were given oral doses of CBZ (50 mg/kg), for "second and third" groups (as test groups) rabbits were given (20 and 40 mg/kg/day) of the VAL respectively, as  suspensi

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref