Preferred Language
Articles
/
vBfaZ48BVTCNdQwCmXaq
Detection of Anti-cancer Activity of Silver Nanoparticles Synthesized using Aqueous Mushroom Extract of Pleurotus ostreatus on MCF-7 Human Breast Cancer Cell Line
...Show More Authors

     In this research, silver nanoparticles (AgNPs) were manufactured using aqueous extract of mushroom Pleurotus ostreatus. Anticancer potential of AgNPs was investigated versus human breast cancer cell line (MCF-7). Cytotoxic response was assessed by MTT assay. AgNPs showed inhibition effect at the following concentrations 12.5, 25, 50, 100 and 200 µg/ml versus MCF-7 cell line, and all treatments had a positive result. The MCF-7 cells were inhibited up to 85.14 % at the concentration 200 μg/ml of AgNPs which reduced cells viability to 14.86%, while 12.5 μg/ml of AgNPs caused 24.23% cells inhibition with reduction of cells viability to 75.77%.

Scopus Crossref
View Publication
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Physics: Conference Series
Synthesis of Composite from Bacterial Cellulose and Gold Nanoparticles
...Show More Authors
Abstract<p>A process of bacterial cellulose gold nanocomposite has been investigated based on experimental work and cited literature. A literature review on the production process is carried out in this study. Bacterial cellulose is a high crystalline fabric material generally used in biomedical applications. A Nanocomposite was made by synthesis from gold and bacterial cellulose. The experimental work includes growing, and isolating bacterial cellulose, preparation of gold Nanoparticles and preparation of Nano composite. Nanoparticle’s formation and adsorption on the cellulose tissue have been observed visually, where a colour change was observed. The predicted particle size for the gold nano</p> ... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Entry cost based on activity-based cost specifications and comparative study
...Show More Authors

Several recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri May 31 2024
Journal Name
Reproductive Health Of Woman
Tumor-promoting roles of IL-4 and TGF-β3, their implications in the progression of breast tumors
...Show More Authors

Immunosuppressive cytokines are the main components of the tumor microenvironment and perform a vital function in controlling the immune response to malignant neoplasms.The objective: to study the influence of interleukin-4 (IL-4) and transforming growth factor-β3 (TGF-β3) on the development of breast tumors in women.Materials and methods. The concentration of cytokines IL-4 and TGF-β3 in blood serum was determined in 40 women with benign breast tumors, 40 women with malignant breast tumors, and 40 healthy patients without breast pathology, who were included in the control group.Breast cancer (BC) patients were divided into two groups; the first group included patients with the II stage of BC, who were considered to have a low le

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sat Dec 11 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Formulation and Characterization of Nimodipine Nanoparticles for the Enhancement of solubility and dissolution rate
...Show More Authors

Nimodipine (NMD) is a dihydropyridine calcium channel blocker useful for the prevention and treatment of delayed ischemic effects. It belongs to class ? drugs, which is characterized by low solubility and high permeability. This research aimed to prepare Nimodipine nanoparticles (NMD NPs) for the enhancement of solubility and dissolution rate. The formulation of nanoparticles was done by the solvent anti-solvent technique using either magnetic stirrer or bath sonicator for maintaining the motion of the antisolvent phase. Five different stabilizers were used to prepare NMD NPs( TPGS, Soluplus®, HPMC E5, PVP K90, and poloxamer 407). The selected formula F2, in which  Soluplus 

has been utilized as a stabilizer, has a par

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (8)
Scopus Crossref