The cytotoxic effect of catechol was examined in two human cancer cell lines, Epidermoid larynx carcinoma (Hep- 2), Cerebral glioblastoma multiforme (AMGM-5) and Murine mammary adenocarcinomacell (AMN3) treated with half concentrations of catechol (1000, 500, 250, 125, 62.5 and 32.25 μM) for 72 hr. The get hold of results showed catechol have a toxic effect of the cell viability of three types of cell lines after 72h of exposure, the toxicity was dependent on catechol concentrations and/or autoxidation for quinines formation, there were a marked decreased of cell viability in a dose dependent manner in all cell line types. Inhibition concentration of catechol for 50% of cell viability (IC50) were calculated, they were at 581.5 μM, 478 μM and 833 μM of HEP-2, AMGM-5 and AMN3 cells, respectively. In addition the combination affects of three cell lines treated with catechol (previously treated at three concentrations close to IC50 were125, 250 and 500 μM for cell lines were incubated for 24 hr.) were assay with 100ul superoxide Dismutase (SOD) , 500 ul peroxidase (POD) and theirs combination (100ul SOD and 500 ul POD) and 125 or 250 μg/mL of catechin against the toxicity of catechol in cell lines to estimated the reduction in quinine formation in these combinations, most inhibition rate of quinine formation display at 100ul SOD alone and combination with 500 ul POD in three cell lines in comparison to other treatments dependant to quinione formation in cells treated with catechol only. Higher percentage in inhibition rate of quinine formation were record in combination treatment of SOD & POD with three concentrations of catechol in AMGM5 cells (54.2%, 59.2% and 65%), followed Hep-2 (44.2%, 42.6% and 52.7%) and AMN3 in 38.7%, 46.6% and 50.7%, respectively, furthermore the less efficient protect obtained in treatment all cell lines with two concentrations of catechins.
Objective(s): To determine the impact of instructional intervention program upon psychological health status for
women who undergo chemotherapy after mastectomy
Methodology: The sample consisted of (100) women, (50) considered as study group, and another (50) the control
group. A pre test was done for both groups (study and control), and then the study samples were exposed to an
instructional intervention and three-dimensional post tests and the length of time between each test 21 days in
the Institute and Hospital of Radiation and Nuclear Medicine. The questionnaire composed of three parts, first,
demographic information; include (age, educational level, type of family, occupation, marital status, and adequacy
of mo
This paper presents the non-linear finite element method to study the behavior of four reinforced rectangular concrete MD beams with web circular openings tested under two-point load. The numerical finite elements methods have been used in a much more practical way to achieve approximate solutions for more complex problems. The ABAQUS /CAE is chosen to explore the behavior of MD beams. This paper also studies, the effect of both size and shape of the circular apertures of MD beams. The strengthening technique that used in this paper is externally strengthening using CFRP around the opening in the MD beams. The numerical results were compared to the experimental results in terms of ultimate load failure and displace
... Show MoreThe objective of this work is to investigate the performance of a conventional three phase induction motor supplied by unbalanced voltages. An effort to study the motor steady state performance under this disturbance is introduced. Using per phase equivalent circuit analysis with the concept of symmetrical components approach, the steady state performance is theoretically calculated. Also, a model for the induction motor with the MATLAB/Simulink SPS tools has been implemented and steady state results were obtained. Both results are compared and show good correlation as well. The simulation model is introduced to support and enhance electrical engineers with a complete understanding for the steady state performance of a fully loaded induc
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreImproving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
The purpose of this study was to determine the influence of environmental pH on production of biofilms and virulence genes expression in Pseudomonas aeruginosa.
Among 303 clinical and environmental samples 109 (61 + 48) isolates were identified as clinical and environmental P. aeruginosa isolates, respectively. Clinical samples were obtained from patients in the Al-Yarmouk hospital in Baghdad city, Iraq. Waste water from Al-Yarmouk hospital was used from site before treatment unit to collect environmental samples. The ability of prod
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More