Aim: To evaluate the cytotoxic activity of newly synthesized a series of novel HDAC inhibitors comprising sulfonamide as zinc binding group and Isatin derivatives as cap group joined by mono amide linker as required to act as HDAC inhibitors. Materials and Methods: The utilization of sulfonamide as zinc binding group joined by N-alkylation reaction with ethyl-bromo hexanoate as linker group that joined by amide reaction with Isatin derivatives as cap groups which known to possess antitumor activity in the designed of new histone deacetylase inhibitors and using the docking and MTT assay to evaluate the compounds. Results: Four compounds have been synthesized and characterized successfully by ART-FTIR, NMR and ESI-Ms. the compounds were synthesized and characterized by successfully by ART-FTIR, NMR and ESI- Ms. Assessed for their cytotoxic activity against human colon adenocarcinoma MCF-7 (IC50, I=105.15, II=60.00, III=54.11, IV=56.57, vorinostat=28.41) and hepatoblastoma HepG2 (IC50, I=63.91, II=135.18, III=118.85, IV=51.46, vorinostat=37.50). Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity. Conclusions: The synthesized compounds (I, II, III and IV) showed cytotoxicity toward MCF-7 and HepG2 cancer cell lines and their docking analysis provided a preliminary indication that they are viable [HDAC6] candidates.
This experiment examined the effects of adding sodium alginate and KOJIC acid as substitutes of Conventional antibiotics to soybean lecithin extender on the characteristics of cryopreserved and frozen buffalo bull semen, as well as evaluation of their additions as antibiotics that to help lowering the microbial load. Following the collection and dilution of in the soybean lecithin extender, the experimental treatments were separated into five groups, as follows: T1: (control-) without adding any antibiotics; T2: (control+) adding the conventional antibiotics Gentamicin 0.4 IU and Tylosin 0.08 IU per 100 ml; T3: adding Kojic acid at (0.06 g/L) T4: adding sodium alginate at (0.6 mg/mL)T
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThis work was included external morphological study of horse fly Tabanus indrae Hauser 1939 new record in Iraq, which belongs to family: Tabanidae order: Diptera. The study was involved the most important taxonomic external characters of the: head, thorax, abdomen and their appendages which are: antenna, maxillary palp, wings, legs, spotting in coloring pattern and female genitalia of abdomen
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThis paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values o
... Show MoreA new copolymer (MFA) was prepared from condensation of melamine (M) with p- methyl – anisole (A) in the presence of condensation agent like 37% (w/v) of formaldehyde. The new copolymer was characterized by elemental, IR and HNMR spectra. The chelating ion-exchange property of this polymer was studied for methylene blue dye in aqueous solution in 100-200ppm concentrations. The adsorption study was carried out over a wide range of pH, shaking time and in media of various kinetic parameters models. Thermal parameters like enthalpy, entropy and Gibbs free energy of adsorption process of methylene blue on surface of MFA resin were determined on the basis of kinetic parameters at different temperatures. To describe the equilibrium of adsorp
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreAquatic Oligochaeta is an important group of Macroinvertebrates that has been very remarkable as bioindicators for assessing water pollution and determining its degree in water bodies. Hence, the idea of the current study aims at studying the impact of Baghdad effluents on the Tigris River by using oligochaetes community as bioindicators . For this purpose, four sites along the inside of Baghdad has been chosen. Site S1 has been located upstream, site S2 and S3 has been at midstream and site S4 at the downstream of the River.This investigation has used different types of biological indicators, including the percentage of oligochaeta within benthic invertebrates, which ranged from 49.2-51.28%. The highest percentage of the tubificid w
... Show More