1,244 research outputs found

    Synthesis of Biocompatible Gold Nanoparticles Using Natural Phytochemical as Antineoplastic Therapy

    Get PDF
    Cancer is the second leading cause of death globally, and was estimated to account for 9.6 million deaths in 2018, according to the WHO. To reduce the significant disability, suffering and deaths caused by cancer worldwide, effective and affordable programs in early diagnosis, screening, treatment, and palliative care are needed. Treatment options may include surgery, medicines and/or radiotherapy. In our research, we try to find a new way to treat cancer naturally. Toxic chemicals are utilized in several of the processes for production of nanoparticles, either in the form of reducing agents to reduce various metal salts to their corresponding nanoparticles, or as stabilizing agents to prevent agglomeration of nanoparticles. These toxic chemicals are powerful reducing agents that are currently used to produce gold and other metallic nanoparticles. These reducing agents are highly toxic to living organisms and to the environment. The purpose of the present experimental study is to prepare biocompatible Gold nanoparticles through 3 months, which contain the phytochemical, with high purity as anti-tumor therapy for destroying of cancer cells. Gold nanoparticles will be synthesized by a “green” procedure in University of Palestine laboratories. Then it will be internalized in cancerous cells to facilitate in detecting and damaging cancerous cells. Cytotoxicity and cellular uptake part of this study will be carried on cancerous cells in Rabbits. Gold nanoparticles will be prepared and applied on cancer tissue of ten rabbits. Then, the tissue culture will be checked out by pathologist. The results of the current may indicate that these non-toxic gold nanoparticles can serve as excellent detectable and damageable agent for cancerous cells; it will be a novel approach toward tumor damaging through Nano-pharmaceuticals

    On Optimality of Myopic Sensing Policy with Imperfect Sensing in Multi-channel Opportunistic Access

    Full text link
    We consider the channel access problem under imperfect sensing of channel state in a multi-channel opportunistic communication system, where the state of each channel evolves as an independent and identically distributed Markov process. The considered problem can be cast into a restless multi-armed bandit (RMAB) problem that is of fundamental importance in decision theory. It is well-known that solving the RMAB problem is PSPACE-hard, with the optimal policy usually intractable due to the exponential computation complexity. A natural alternative is to consider the easily implementable myopic policy that maximizes the immediate reward but ignores the impact of the current strategy on the future reward. In this paper, we perform an analytical study on the optimality of the myopic policy under imperfect sensing for the considered RMAB problem. Specifically, for a family of generic and practically important utility functions, we establish the closed-form conditions under which the myopic policy is guaranteed to be optimal even under imperfect sensing. Despite our focus on the opportunistic channel access, the obtained results are generic in nature and are widely applicable in a wide range of engineering domains.Comment: 21 pages regular pape

    On Optimality of Myopic Policy for Restless Multi-armed Bandit Problem with Non i.i.d. Arms and Imperfect Detection

    Full text link
    We consider the channel access problem in a multi-channel opportunistic communication system with imperfect channel sensing, where the state of each channel evolves as a non independent and identically distributed Markov process. This problem can be cast into a restless multi-armed bandit (RMAB) problem that is intractable for its exponential computation complexity. A natural alternative is to consider the easily implementable myopic policy that maximizes the immediate reward but ignores the impact of the current strategy on the future reward. In particular, we develop three axioms characterizing a family of generic and practically important functions termed as gg-regular functions which includes a wide spectrum of utility functions in engineering. By pursuing a mathematical analysis based on the axioms, we establish a set of closed-form structural conditions for the optimality of myopic policy.Comment: Second version, 16 page

    Access to the coast and erosion control: use of wastes on local engineering works in the coast of Gaza City

    Get PDF
    Investment in the coastal resources of Gaza City is vital to various developmental issues and projects. Access to the coast and coastal erosion represent two major geo-environmental problems to the city. This paper describes local engineering works developed by the municipality and local people to overcome such problems. A cliff of calcareous sandstone – Kurkar as it is locally known – (up to 18 m high), is located at a distance of 20–50 m from the water–land contact. People who need to reach the beach must cross this Kurkar cliff. The engineering works used to facilitate access to the beach are: old automobile tires, white waste skeletons (refrigerators) and construction waste, where long stairs were designed using these materials. Meanwhile the engineering works which were used as erosion control measures include: rock gabions, concrete wastes, construction waste, concrete walls and shallow

    Environmental contamination of groundwater in the Gaza Strip

    Get PDF
    Environmental problems of groundwater contamination in the Gaza Strip are summarized in this paper. The Gaza Strip is a very narrow and highly populated area along the coast of the Mediterranean Sea (360 km2). Human activities greatly threaten the groundwater resources in the area, while the unconfined nature of some parts of the coastal main aquifer favors groundwater contamination. Recent investigations show contamination of the aquifer with organic substances from detergents, agrochemicals, sewage (cesspools), and waste degradation. These effects enhance each other because there is no recycling industry, sewage system, or any type of environmental protection management at present. Inorganic contamination results from overpumping, which increases the salinity of the groundwater. Seawater intrusion also increases the salinity of the groundwater that are used for drinking and agricultural

    Spatial reuse in wireless LAN networks

    Get PDF
    International audienceThe absence of a radio carrier reuse pattern in wireless LAN systems necessiti- es to apply a collision avoidance mechanism in order to manage all collisions that can produce on the medium sharing. Previous studies concerning cellular radio networks are in general focused on the basis of frequency cell partition- . We re-investigate this frequency reuse topic for wireless LANs where all nodes use the same channel and are randomly placed. Several measurements are presented to compute all radio parameters in a local radio network. Then, theoretical study and simulation results are introduced to deduce the distance that permits a complete carrier reuse by using a carrier sense mechanism

    SSO Based Fingerprint Authentication of Cloud Services for Organizations

    Get PDF
    Access to a pool of programmable resources, such as storage space, applications, services, and on-demand networks, is made possible by cloud computing technology. Involving the cloud with the organization reduces its efforts to meet the needs of its customers. The Single Sign-On (SSO) method, which enables users to access various application services using a single user credential, is one of the key benefits of cloud computing. There are numerous problems and difficulties with cloud computing that need to be highlighted. However, protecting user agent privacy against security assaults is far more challenging. To combat security and privacy assaults, this study suggests SSO-based biometric authentication architecture for cloud computing services. Since end devices are computationally inefficient for processing user information during authentication, biometric authentication is effective for resources controlled by end devices at the time of accessing cloud services. As a result, the proposed design minimizes security attacks in cloud computing. An innovative strategy that establishes a one-to-one interaction between the user agent and the service provider is also included in the suggested design. In this case, user agents can use their fingerprint to access various cloud application services and seek registration. The highlights of the suggested architecture have been offered based on comparison analysis with a number of existing architectures

    Efficient Vertical Handoffs in Wireless Overlay Networks

    Get PDF
    Mobile IP is used to keep track of location information and make the data available to the mobile device anytime, anywhere. It is designed to address the macro-mobility management, it does not address micro-level mobility issues such as handoff latency and packet loss. In this paper, we propose a mobility management scheme to handle the movements of mobile nodes among different wireless network technologies. Our scheme combines: (a) A hierarchical mobility management architecture to hide mobility of mobile nodes within the foreign domain from the home agent; (b) A handoff protocol to reduce packet loss during the transition from one cell to another; (c) The use of our proposed virtual cells in order to reduce the upward vertical handoff latency and disruption as much as possible. Our design is based on the Internet Protocol (IP) and is compatible with the Mobile IP standard (MIP). We also present simulation results showing that our handoff scheme is very fast to meet the requirements of an interactive communication session such as Internet telephony and avoiding packet loss
    • …
    corecore