Histone deacetylase inhibitors with zinc binding groups often exhibit drawbacks like non-selectivity or toxic effects. Thus, there are continuous efforts to modify the currently available inhibitors or to discover new derivatives to overcome these problems. One approach is to synthesize new compounds with novel zinc binding groups. The present study describes the utilization of acyl thiourea functionality, known to possess the ability to complex with metals, to be a novel zinc binding group incorporated into the designed histone deacetylase inhibitors. N-adipoyl monoanilide thiourea (4) and N-pimeloyl monoanilide thiourea (5) have been synthesized and characterized successfully. They showed inhibition of growth of human colon adenocarcinoma and mouse hepatoblastoma cells with low cytotoxic effect against normal human breast cells. Their binding mode to the active site of several histone deacetylases has been studied by docking and the results gave a preliminary indication that they could be successful histone deacetylase inhibitors.
A new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte
... Show MoreThe importance of physical and nonphysical architectural design values made architectural designers need good experience to be experts of architectural values reasonably without neglecting any value in the design process. The importance of such values made that ignoring any values and mistakes occurs in the design process. Simultaneously, architectural designers' different nature and the difference in their experiences are causing different understandings of the design values, thus causing architectural mistakes. The research problem appears from the randomly propagating of mistakes in contemporary architecture, which is about to become a phenomenon in Al Sulaymaniyah city. The research aims to find the main reason
... Show MoreA simple ,accurate and sensitive spectrophotometric method has been developed the determination of Cobalt(II) and Cupper (II) .The method is based on the chelation of Co(II) and Cu(II) ions with 4-(4´-pyrazolon azo) -2-Naphthol(APAN) in aqueous medium . The complexes have a maximum absorption at (513) and (506) nm and ? max 0.531×10 4 and 0.12×10 5 L.mol -1.cm -1 for Co(II) and Cu(II) respectively .The reagent and two complexes have been prepared in ethanolic solution.The stoichiometry of both complexes were found to be 1:2 (metal :legend) .The effects of various cations and anions on Co(II) and Cu(II) determination have been investigated .The stability constants and standard deviations for Co(II) and Cu(II) 0.291 x107 ,0.909X108 L.mol
... Show Morethe physical paraneters of oxadizole derivaties as donor molecules have been measured the charge transfer and methanol as solvent have been estimated from the electonic spectra
A study worthy of study and objective analysis of the relationship of formal synthesis and innovative effectiveness in the design of modern women's fabrics, which deals with the first chapter the problem of research based on the following questions: (What role of innovative thinking in the formal synthesis of women's clothing designs Modern)
The research objectives included the following:
1 - defines the concept of innovative thinking and its effectiveness in design
2 - Reveal the role of innovative thinking in the formal synthesis of the designs of modern women's fabrics
The theoretical framework which included the following parts:.
1 - Innovative thinkin
... Show MoreAlbizia lebbeck biomass was used as an adsorbent material in the present study to remove methyl red dye from an aqueous solution. A central composite rotatable design model was used to predict the dye removal efficiency. The optimization was accomplished under a temperature and mixing control system (37?C) with different particle size of 300 and 600 ?m. Highest adsorption efficiencies were obtained at lower dye concentrations and lower weight of adsorbent. The adsorption time, more than 48 h, was found to have a negative effect on the removal efficiency due to secondary metabolites compounds. However, the adsorption time was found to have a positive effect at high dye concentrations and high adsorbent weight. The colour removal effi
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More