Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (226)
  • Open Access

    VIEWPOINT

    Microfluidic methods used in exosome isolation

    ADEM OZCELIK1,*, OZGE CEVIK2

    BIOCELL, Vol.47, No.5, pp. 959-964, 2023, DOI:10.32604/biocell.2023.028371

    Abstract Exosomes are important biomarkers for clinical diagnosis. It is critical to isolate secreted exosomes from bodily fluids such as blood, saliva, breast milk, and urine for liquid biopsy applications. The field of microfluidics provides numerous benefits for biosample processing, diagnostics, and prognostics. Several microfluidics-based methods have been employed for the isolation and purification of exosomes in the last ten years. These microfluidic methods can be grouped into two categories based on passive and active isolation mechanisms. In the first group, inertial and hydrodynamic forces are employed to separate exosomes based on their size differences. In the second group, external forcefields… More >

  • Open Access

    ARTICLE

    Raloxifene-loaded and aptamer-bonded exosomes induce autophagic and apoptotic death in HeLa cells by enhancing the lysosomotropic effect

    OMER ERDOGAN1, GULEN MELIKE DEMIRBOLAT2, OZGE CEVIK1,*

    BIOCELL, Vol.47, No.5, pp. 1051-1063, 2023, DOI:10.32604/biocell.2023.028129

    Abstract Background: Raloxifene, a selective estrogen receptor modulator, is also known to be a lysosomotropic agent. The bioavailability of raloxifene is around 2% due to extensive hepatic transport. Exosomes are nanosized vesicles that are naturally released from cells. Method: In this study, exosomes released from HeLa cervical cancer cells were loaded with raloxifene to increase its bioavailability, and an aptamer was attached to the exosome membrane for targeting only HeLa cells. Characterization of exosomes isolated from HeLa cells was performed by transmission electron microscopy, zeta sizer, and western blotting. In addition, the cytotoxic, apoptotic, autophagic, and lysosomotropic effects of the prepared… More >

  • Open Access

    VIEWPOINT

    Analysis of tumor-draining vein secretome: A direct access to tumor-derived extracellular vesicles in surgical lung cancer patients

    YANGYI HE1,2, DAVID SANCHEZ-LORENTE3,4,5, MELISSA ACOSTA-PLASENCIA1, MARC BOADA3,4,5, ANGELA GUIRAO3,4,5, RAMON M. MARRADES4,5,6,7, LAUREANO MOLINS3,4,5, ALFONS NAVARRO1,4,5,*

    BIOCELL, Vol.47, No.5, pp. 951-957, 2023, DOI:10.32604/biocell.2023.027718

    Abstract Tumor-secreted extracellular vesicles (EVs) participate in the metastasis process through different mechanisms, including the preparation of the pre-metastatic niche to grant circulating tumor cells (CTCs) implantation and growth. The study of the metastasis process through the analysis of CTCs and tumor-derived EVs is difficult because of the dilution grade of these elements in peripheral blood. In early-stage lung cancer patients, the tumor-secreted products are even more diluted. An attractive strategy in surgical lung cancer patients is to purify them from a pulmonary tumor-draining vein where they are enriched. The information obtained from the analysis of EVs and CTCs purified from… More >

  • Open Access

    ARTICLE

    The extracellular secretion of miR-1825 wrapped by exosomes increases CLEC5A expression: A potential oncogenic mechanism in ovarian cancer

    QIAOLING WU1,2, ZHAOLEI CUI3, HONGMEI XIA1, SHAN JIANG1, JING BAI4, ZHUO SHAO4, YANG SUN1,*

    BIOCELL, Vol.47, No.5, pp. 1039-1050, 2023, DOI:10.32604/biocell.2023.027494

    Abstract Background: Ovarian cancer (OC) is a leading cause of gynecological cancer-linked deaths worldwide. Exosomal miR-1825 and its target gene C-type lectin domain family 5 member A (CLEC5A) are associated with tumorigenesis in cancers that was further probed. Methods: Exosomal miR-1825 expression in exosomes and its impact on overall survival (OS) prediction were determined using Gene Expression Omnibus (GEO) and The Cancer Genome Atlas (TCGA) data. Target genes of miR-1825 were searched in five prediction databases and prognostically significant differentially expressed genes were identified. Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) enrichment analyses were carried out. The… More >

  • Open Access

    ARTICLE

    Immunoregulatory effects of human amniotic mesenchymal stem cells and their exosomes on human peripheral blood mononuclear cells

    XIN TIAN, XIANGLING HE*, SHUQIN QIAN, RUNYING ZOU, KEKE CHEN, CHENGGUANG ZHU, ZEXI YIN

    BIOCELL, Vol.47, No.5, pp. 1085-1093, 2023, DOI:10.32604/biocell.2023.027090

    Abstract Background: The immunomodulatory effects of mesenchymal stem cells (MSCs) and their exosomes have been receiving increasing attention. This study investigated the immunoregulatory effects of human amniotic mesenchymal stem cells (hAMSCs) and their exosomes on phytohemagglutinin (PHA)-induced peripheral blood mononuclear cells (PBMCs). Methods: The hAMSCs used in the experiment were identified by light microscopy and flow cytometry, and the differentiation ability of the cells was determined by Oil Red O and Alizarin Red staining. The expressions of transforming growth factor (TGF)-β, indoleamine 2,3-dioxygenase (IDO), cyclooxygenase-2 (COX-2), hepatocyte growth factor (HGF), and interleukin (IL)-6 were detected by quantitative real-time polymerase chain reaction… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment

    Manal Abdullah Alohali1, Muna Elsadig1, Fahd N. Al-Wesabi2, Mesfer Al Duhayyim3, Anwer Mustafa Hilal4,*, Abdelwahed Motwakel4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3087-3102, 2023, DOI:10.32604/csse.2023.036802

    Abstract With the advent of the Internet of Things (IoT), several devices like sensors nowadays can interact and easily share information. But the IoT model is prone to security concerns as several attackers try to hit the network and make it vulnerable. In such scenarios, security concern is the most prominent. Different models were intended to address these security problems; still, several emergent variants of botnet attacks like Bashlite, Mirai, and Persirai use security breaches. The malware classification and detection in the IoT model is still a problem, as the adversary reliably generates a new variant of IoT malware and actively… More >

  • Open Access

    ARTICLE

    Learning-Based Artificial Algae Algorithm with Optimal Machine Learning Enabled Malware Detection

    Khaled M. Alalayah1, Fatma S. Alrayes2, Mohamed K. Nour3, Khadija M. Alaidarous1, Ibrahim M. Alwayle1, Heba Mohsen4, Ibrahim Abdulrab Ahmed5, Mesfer Al Duhayyim6,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3103-3119, 2023, DOI:10.32604/csse.2023.034034

    Abstract Malware is a ‘malicious software program that performs multiple cyberattacks on the Internet, involving fraud, scams, nation-state cyberwar, and cybercrime. Such malicious software programs come under different classifications, namely Trojans, viruses, spyware, worms, ransomware, Rootkit, botnet malware, etc. Ransomware is a kind of malware that holds the victim’s data hostage by encrypting the information on the user’s computer to make it inaccessible to users and only decrypting it; then, the user pays a ransom procedure of a sum of money. To prevent detection, various forms of ransomware utilize more than one mechanism in their attack flow in conjunction with Machine… More >

  • Open Access

    ARTICLE

    Kinetic Modeling of Light Naphtha Hydroisomerization in an Industrial Universal Oil Products Penex™ Unit

    Ramzy S. Hamied1, Zaidoon M. Shakor2,*, Anfal H. Sadeiq1, Adnan A. Abdul Razak2, Ammar T. Khadim3

    Energy Engineering, Vol.120, No.6, pp. 1371-1386, 2023, DOI:10.32604/ee.2023.028441

    Abstract Recently, the isomerization of light naphtha has been increasingly significant in assisting refiners in meeting sternness specifications for gasoline. Isomerization process provides refiners with the advantage of reducing sulfur, olefin, and benzene in the gasoline basin without significantly victimizing the octane. The mathematical modeling of a chemical reaction is a critical tool due to it can used to optimize the experimental data to estimate the optimum operating conditions for industrial reactors. This paper describes light naphtha isomerization reactions over a Pt/Al2O3-Cl catalyst at the Al-Dura Oil Refinery (Baghdad, Iraq) using a newly developed universal mathematical model. The proposed kinetic model… More >

  • Open Access

    ARTICLE

    Novel Hybrid XGBoost Model to Forecast Soil Shear Strength Based on Some Soil Index Tests

    Ehsan Momeni1, Biao He2, Yasin Abdi3,*, Danial Jahed Armaghani4

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2527-2550, 2023, DOI:10.32604/cmes.2023.026531

    Abstract When building geotechnical constructions like retaining walls and dams is of interest, one of the most important factors to consider is the soil’s shear strength parameters. This study makes an effort to propose a novel predictive model of shear strength. The study implements an extreme gradient boosting (XGBoost) technique coupled with a powerful optimization algorithm, the salp swarm algorithm (SSA), to predict the shear strength of various soils. To do this, a database consisting of 152 sets of data is prepared where the shear strength (τ) of the soil is considered as the model output and some soil index tests… More >

  • Open Access

    ARTICLE

    Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment

    Mesfer Al Duhayyim1,*, Heba G. Mohamed2, Fadwa Alrowais3, Fahd N. Al-Wesabi4, Anwer Mustafa Hilal5, Abdelwahed Motwakel5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1293-1310, 2023, DOI:10.32604/csse.2023.035589

    Abstract The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations.… More >

Displaying 31-40 on page 4 of 226. Per Page