STAG proteins, which are part of the cohesin complex and encoded by the STAG genes, are known as Irr1/Scc3 in yeast and as SA/STAG/stromalin in mammals. There are more variants as there are alternate splice sites, maybe three open reading frames (ORFs) code for three main proteins, including: SA1 (STAG1), SA2 (STAG2) and SA3 (STAG3). The cohesin protein complex has various essential roles in eukaryotic cell biology. This study compared the expression of the STAG1 gene in four different breast cancer cell lines, including: MCF-7, T-47D, MDA-MB-468, and MDA-MB-231 and normal breast tissue. RNA was extracted from these cell lines and mRNA was converted to cDNA, and then expression of the STAG1 gene was quantified by three sets of specific prim
... Show MoreThis study aims to evaluate the biocompatibility of a novel filler material intended to improve the longevity of polymer systems used in prosthetics in respect of cytotoxicity and skin irritation. RTV50F silicone elastomer incorporated with various percentages of hexagonal boron nitride (H-BN) (0.1, 0.3, 0.5, 0.7, and 1 wt%) have been tested. Silicone without H-BN was utilized as the control for comparison. The in vitro cytotoxicity test includes specimens (n=18) with 10 mm in diameter and 2 mm in thickness applied directly to the normal human fibroblast cell line (NHF) and incubated for 72 hours, then 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) assay was used to determine the cell viability. The skin irritati
... Show MoreThe research aims to develop the general performance and improve the level of activity of private insurance companies in line with the current progress of the country. Besides, Evaluating financial performance to diagnose weaknesses and strengths in sample research companies and then developing appropriate solutions. The deviation in the financial performance of the research sample was revealed by measuring the various accounts of the company. The research sample included five companies in the private insurance sector listed in the Iraqi Stock Exchange Market, which represent the private insurance sector. The research concluded that the added economic value is a broad concept that goes beyond the traditional performance evaluation process a
... Show MoreThe paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
In the present work theoretical relations are derived for the efficiency evaluation for the generation of the third and the fourth harmonics u$ing crystal cascading configuration. These relations can be applied to a wide class of nonlinear optical materials. Calculations are made for beta barium borate (BBO) crystal with ruby laser /.=694.3 nm . The case study involves producing the third harmonics at X. =231.4 nm of the fundamental beam. The formula of efficiency involves many parameters, which can be changed to enhance the efficiency. The results showed that the behavior of the efficiency is not linear with the crystal length. It is found that the efficiency increases when the input power increases. 'I'he walk-off length is calculated for
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreThis paper is concerned with the numerical solutions of the vorticity transport equation (VTE) in two-dimensional space with homogenous Dirichlet boundary conditions. Namely, for this problem, the Crank-Nicolson finite difference equation is derived. In addition, the consistency and stability of the Crank-Nicolson method are studied. Moreover, a numerical experiment is considered to study the convergence of the Crank-Nicolson scheme and to visualize the discrete graphs for the vorticity and stream functions. The analytical result shows that the proposed scheme is consistent, whereas the numerical results show that the solutions are stable with small space-steps and at any time levels.
