Preferred Language
Articles
/
ijs-9472
Test the Cytotoxicity of Pleurotin Extracted from an Edible Mushroom Pleurotus osteratus Against Three Human Carcinoma Cell Line
...Show More Authors

The study included selection six species of the fungi related to Pleurotus genus were evaluated for their ability to production of Pleurotin, one of them, Pleurotus ostreatus (P.11) was isolated and identified in the present study. Pleurotin was extracted with screening by Thin Layer Chromatography (TLC) and quantification High Performance Liquid Chromatography (HPLC). Cytotoxicity of Pleurotin extracted from P. ostreatus (P.11) grown in different sugar sources (galactose, mannitol, sucrose, dextrose and lactose) liquid media was test against three selected cancer cell lines, CaSki, MCF-7 and A549 addition to Human Non Cancer Fibroblast Cell Line (MRC-5). Pleurotin of P. ostreatus (P.11) grown in galactose induced the significant highest growth inhibition against all three cancer cell lines MCF-7 CaSki, and A549 at 72 h treatment period with IC50 29.84 ± 2.37, 30.25 ± 2.40 and 37.60 ± 2.65 μg/ml respectively when the P≤0.01, while it showed no adverse effect on the non-cancer human fibroblast cell line MRC-5 with IC50 >200 μg/ml. Cytotoxicity of Pleurotin was compared with cytotoxicity of the positive controls (chemotherapeutic drugs) including Doxorubicin against CaSki and A549 cell lines and Cisplatin against MCF-7 and MRC-5 cell lines, although IC50 of pleurotin was higher (30.25 ± 2.40 and 37.60 ± 2.65 μg/ml) than Doxorubicin (0.18 ± 0.00 and 1.10 ± 0.02 μg/ml) of CaSki and A549 cell lines, respectively, and also IC50 of Pleurotin was higher (29.84 ± 1.73 and >200 μg/ml) than Cisplatin (8.20 ± 0.25 and 8.88 ± 0.13 μg/ml) of MCF-7 and MRC-5 cell lines, respectively, pleurotin was natural product from an edible fungus while Doxorubicin and Cisplatin were chemical drugs.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
Human Dignity and the Problem of Women Cutting Off Prayer: Women Cutting Off Prayer
...Show More Authors

Our creator has honored human beings and granted them a noble place, the provisions of the Islamic system are designed to strengthen and consolidate this dignity and respect. Since women are human beings, they have their respect, status and dignity. There are some prophetic sayings concerning women that may be understood as contrary to this value, the value of dignity and respect for human beings. One example is the Hadith of a woman cutting off a man’s prayer if she passed in front of his prayer. The study examines this topic and presents answers for it.

 

In dealing with the subject, the study followed the descriptive, analytical and deductive approach of mentioning legislative texts, analyzing them and deducing

... Show More
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Three Weighted Residuals Methods for Solving the Nonlinear Thin Film Flow Problem
...Show More Authors
Abstract<p>In this paper, the methods of weighted residuals: Collocation Method (CM), Least Squares Method (LSM) and Galerkin Method (GM) are used to solve the thin film flow (TFF) equation. The weighted residual methods were implemented to get an approximate solution to the TFF equation. The accuracy of the obtained results is checked by calculating the maximum error remainder functions (MER). Moreover, the outcomes were examined in comparison with the 4<sup>th</sup>-order Runge-Kutta method (RK4) and good agreements have been achieved. All the evaluations have been successfully implemented by using the computer system Mathematica®10.</p>
View Publication
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
Chaos in the three-species Sokol-Howell food chain system with fear
...Show More Authors

View Publication
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Truncated Test for Finding the Parameters of Single Sampling Plan under Distribution of Log-Logistic
...Show More Authors

A group of acceptance sampling to testing the products was designed when the life time of an item follows a log-logistics distribution. The minimum number of groups (k) required for a given group size and acceptance number is determined when various values of Consumer’s Risk and test termination time are specified. All the results about these sampling plan and probability of acceptance were explained with tables.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences &amp; Humanities
The Role of Human Resources Management Professionals' Skills in Information Technology
...Show More Authors

The current research aims to measure the impact of the skills of human resources management professionals in information technology in Iraqi private banks, as the skills of human resources management professionals constitute the modern trend of banks' interest in employees with outstanding performance, and the presence of information technology in banks is a prerequisite for dealing with the huge amount of data. And converting it into information to support the decision-maker in light of a complex environment, and the field research problem was the presence of a clear lack of interest in the skills of human resource management professionals and the weak adoption of information technology, which was reflected negatively on the compet

... Show More
View Publication
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Role OF Human Resource managment Strategies In Enhancing Cognitive Skills.
...Show More Authors

Abstract:

 In its theoretical farm, the research adobet  the subject of human resource management strategies  and the cognitive skills. It comes as result of the rapid development which considers it human resource. as main axis in organization , the research in includes ,connective analysis  , between  human resource management strategies  and cognitive skills which is considers one of the new concept that should  be  studied widly so that the organization can be able recognize it as concept and type and its importance for people in the organization.The study method was descriptive and  analytics , it identified collation of hypothesis which were by statist too

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The strategic role of human resource development in developing competitive advantage
...Show More Authors

This research aims at highlighting the strategic role of human resource development in developing competitive advantage in light of the great challenges and rapid changes witnessed in recent years in the business world. The human element is the main engine of the organization's resources, especially when it possesses the skill quality and cognitive abilities commensurate with the nature of work. Therefore, this research focuses on the importance of human resources development strategy in contemporary organizations and reviews the summary of literature and theoretical foundations related to human resources development, as well as various philosophical concepts related to the competitive advantage and to indicate the important role

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Variables yet and future help in the development of human resources
...Show More Authors

 This research aims to study a range of yet and future variables that can affect human resources in Iraq and public organizations that influence the size of each, and the extent of its contribution to the development of human resources through the National Investment Commission of Baghdad. The identified research problem in a set of questions was the most important, what are the variables that help in the development of human resources to the Investment Commission of Baghdad theme of the search, in order to achieve the goal of research and answer questions about the problem, applied research on both the research community's (55) individual executives and employees.

 Researcher has identified a r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation The Efficiency And Effectiveness of The Iraq stock Exchange -An Empirical Study From July 2004 to March 2008–
...Show More Authors

 The aim of this study was to provide an overall assessment to the efficiency of the Iraq stocks exchanges (ISE) through specifying well –known models .First, Fama's efficient market hypothesis as a contrary concept to the random walk hypothesis, was performed and it has been found that ISE follows the random process, so the price of the shares can't be predicated on the basis of past information. Second,we use a multifactor model, which so named multiple regression, to explore the link between ISE  and the main economic indicators. our empirical analysis finds that every weak associations exists between major ISE measures and main economic indicators.

View Publication Preview PDF
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More