Nigella sativa has various pharmacological properties and has been used throughout history for a variety of reasons. However, there is limited data about the effects of N. sativa (NS) on human cancer cells. This study aimed at observing the roles of methanolic extract of N. sativa on apoptosis and autophagy pathway in the Human PC3 (prostate cancer) cell line. The cell viability was checked by MTT assay. Clonogenic assay was performed to demonstrate clonogenicity and Western blot was used to check caspase-3, TIGAR, p53, and LC3 protein expression. The results demonstrated that PC3 cell proliferation was inhibited, caspase-3 and p53 protein expression was induced, and LC3 protein expression was modulated. The clonogenic assay showed that PC3
... Show MoreA sensitive spectrophotometric method was developed for the estimation of cefdinir (CFD), a cephalosporin species. This study involves two methods, and the first method includes the preparing of azo dye by the reaction of CFD diazonium salt with 4-Tert-Butylphenol (4-TBP) and 2-Naphthol (2-NPT) in alkaline medium, which shows colored dyes measured at λmax 490 and 535 nm, respectively. Beer's law was obeyed along the concentration range of (3-100) μg.ml-1. The limits of detection were 0.246, 0.447 μg.ml-1 and molar absorptivities were 0.6129×104, 0.3361×104 L.mol-1cm-1 for (CFD-4-TBP) and (CFD-2-NPT), respectively. The second method includes preconcentration for cefdinir dyes by using cloud point extraction in the presence of Triton
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreOptical spectrum of SN1987A at days 4 from the explosion and its light curve through the first 1444 days after the explosion have been studied. The hydrogen lines present in the spectrum confirms the general characteristics of Type II SN that occur due to core collapse of massive star. Each of the total mass ejected from the explosion and the amount of the total mass of Nickel radioactive isotopes that produced during the explosion as well as the initial velocity of the ejecta and the explosion energy have been determined and compared with different observed and calculated models obtained by different researchers and it’s found that, about 8.8 Mʘ of the progenitor envelope mass had been ejected during the explosion and it’s mixed with
... Show MorePurpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreThis work describes the development of new spectrophotometric techniques for 3-aminophenol assessment. The first technique involves using benzidine in an alkaline solution to convert 3-aminophenol into a colored complex. The produced complex has a red color with an absorbance of 462 nm. Between the concentration range 5–14 μg mL−1, Beer's law is obeyed with a correlation coefficient (R2) of 0.99781, a limit of detection (LOD) of 0.0423 μg mL−1, and a limit of quantification (LOQ) of 0.1411 μg mL−1. The recovery was between 87.2–95.43%, the relative standard deviation (%RSD) was 2.40–3.31% and the molar absorptivity was 3.545 × 103 L mol−1 cm−1. Secondly, cloud point extraction (CPE) was used to determ
... Show More