Ischemic stroke is a significant cause of morbidity and mortality worldwide. Autophagy, a process of intracellular degradation, has been shown to play a crucial role in the pathogenesis of ischemic stroke. Long non-coding RNAs (lncRNAs) have emerged as essential regulators of autophagy in various diseases, including ischemic stroke. Recent studies have identified several lncRNAs that modulate autophagy in ischemic stroke, including MALAT1, MIAT, SNHG12, H19, AC136007. 2, C2dat2, MEG3, KCNQ1OT1, SNHG3, and RMRP. These lncRNAs regulate autophagy by interacting with key proteins involved in the autophagic process, such as Beclin-1, ATG7, and LC3. Understanding the role of lncRNAs in regulating autophagy in ischemic stroke may provide new insights into the pathogenesis of this disease and identify potential therapeutic targets for its treatment.
Nigella sativa has various pharmacological properties and has been used throughout history for a variety of reasons. However, there is limited data about the effects of N. sativa (NS) on human cancer cells. This study aimed at observing the roles of methanolic extract of N. sativa on apoptosis and autophagy pathway in the Human PC3 (prostate cancer) cell line. The cell viability was checked by MTT assay. Clonogenic assay was performed to demonstrate clonogenicity and Western blot was used to check caspase-3, TIGAR, p53, and LC3 protein expression. The results demonstrated that PC3 cell proliferation was inhibited, caspase-3 and p53 protein expression was induced, and LC3 protein expression was modulated. The clonogenic assay showed that PC3
... Show MoreThe aim of the research is to prepare motor sense exercises for developing motor and physiological abilities of backstroke and forward stroke service skill in badminton and investigated their effect. The research is adopted the experimental method with two groups design. The sample of the research is 8 players (13-15 years). The sample is divided into two groups of 4 players for each group. Both groups are exposed to pre and post tests, after the experimented were finished, the results are statically analyzed. The results have showed that there are positive developing abilities of motor and physiological of service skill in badminton. Finally, these prepared exercises are recommended for developing players’ abilities in badminton.
Background: Stroke is an acute neurologic injury and represents the 2nd leading cause of mortality worldwide, and also the most leading cause of acquired disability and morbidity in adults.
Objective: Effect and association between stroke and risk factors.
Type of the study: A retrospective study.
Methods: The study conducted on 312 patients in 2016, all data were collected from patients’ files from the emergency unit, which included basic demographic and disease characteristic, co morbid diseases, risk factors, final diagnosis.
Results: both previous stroke, ischemic heart disease was strong predictor of new
... Show MoreIn this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
In this paper, an efficient method for compressing color image is presented. It allows progressive transmission and zooming of the image without need to extra storage. The proposed method is going to be accomplished using cubic Bezier surface (CBI) representation on wide area of images in order to prune the image component that shows large scale variation. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, bi-orthogonal wavelet transform is applied to decompose the residue component. Both scalar quantization and quad tree coding steps are applied on the produced wavelet sub bands. Finally, adaptive shift coding is applied to handle the remaining statistical redundancy and attain e
... Show MoreBackground: The normal decline in systolic blood pressure during recovery phase of treadmill exercise dose not occur in most patients with coronary artery disease, in others recovery values systolic blood pressure may even exceed the peak exercise value. Objectives: Treadmill exercise test parameters indicating the presence and extent of coronary artery disease have traditionally included such as exercise duration, blood pressure and ST-segment response to exercise. The three –minute systolic blood pressure ratio is another important indicator of presence and significance of coronary artery disease is useful and obtainable measure that can be applied in all patients who are undergoing stress testing for evaluation of suspected is
... Show MoreThe primary aim of the study was to find out the values of some biomechanical variables for the long serve skill in badminton and to identify the effect of biomechanical feedback on the performance of long serve. The present study had a single group, pre-post experimental study design. The research community was determined by the intentional method of one group with a pre-and post-test. The players of the Assyrian badminton club constituted the research community. A total of 12 players were present in the research community. The badminton players falling within the age group of 15-17 years for the season 2020-2021 were recruited as the participants for the study. A total of five players were selected as the participant
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show More