Checkpoint inhibitors are a type of immune therapy used to treat different types of cancers. These drugs block different checkpoint proteins, for example, CTLA-4, PD-1, and PD-L1 inhibitors.
They block proteins that stop the immune system from attacking the cancer cells. Checkpoints are also described as a type of monoclonal antibody that antagonizes binding between B7 to CTLA-4 and PD-L1 to PD-1.
Immune checkpoint inhibitors are used to treat BARCA mutated triple-negative breast cancer (TNBCS) in patients who do not respond to chemotherapy, and also in the treatment of highly mutated and solid tumors such as brain tumors, liver, and pancreatic cancers.
Immune checkpoint inhibitors exhibit an effect on solid tumo
... Show MoreThe marshes are one of the important environmental features affecting human and animal systems, so the studying of changes they undergo is one of the important topics. This study is concerned with the changes occurring in the Al Saadya marsh for the period from 1987 to 2017 exclusively in the winter season (the marshes’ revival season in Iraq revive). In order to inspect the changes in this marsh, we choose 7 years to cover the study period as a criterion years, namely 1987, 1990, 1995, 2000, 2007, 2014 and 2017. The “Maximum Likelihood” classifier was used to separate the stacked land cover features, where the minimum overall accuracy ratio that recorded for all years of study was 96%. The results revealed that Al-Saadya marsh went t
... Show MoreThe COVID-19 pandemic has had a huge influence on human lives all around the world. The virus spread quickly and impacted millions of individuals, resulting in a large number of hospitalizations and fatalities. The pandemic has also impacted economics, education, and social connections, among other aspects of life. Coronavirus-generated Computed Tomography (CT) scans have Regions of Interest (ROIs). The use of a modified U-Net model structure to categorize the region of interest at the pixel level is a promising strategy that may increase the accuracy of detecting COVID-19-associated anomalies in CT images. The suggested method seeks to detect and isolate ROIs in CT scans that show the existence of ground-glass opacity, which is fre
... Show MoreThe adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correla
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.