Histone deacetylase inhibitors with zinc binding groups often exhibit drawbacks like non-selectivity or toxic effects. Thus, there are continuous efforts to modify the currently available inhibitors or to discover new derivatives to overcome these problems. One approach is to synthesize new compounds with novel zinc binding groups. The present study describes the utilization of acyl thiourea functionality, known to possess the ability to complex with metals, to be a novel zinc binding group incorporated into the designed histone deacetylase inhibitors. N-adipoyl monoanilide thiourea (4) and N-pimeloyl monoanilide thiourea (5) have been synthesized and characterized successfully. They showed inhibition of growth of human colon adenocarcinoma and mouse hepatoblastoma cells with low cytotoxic effect against normal human breast cells. Their binding mode to the active site of several histone deacetylases has been studied by docking and the results gave a preliminary indication that they could be successful histone deacetylase inhibitors.
An automatic text summarization system mimics how humans summarize by picking the most significant sentences in a source text. However, the complexities of the Arabic language have become challenging to obtain information quickly and effectively. The main disadvantage of the traditional approaches is that they are strictly constrained (especially for the Arabic language) by the accuracy of sentence feature functions, weighting schemes, and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature tha
... Show MoreRecent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T
... Show MoreIn this study , Iraqi Bentonite clay was used as a filler for polyvinyl chloride polymer. Bentonite clay was prepared as a powder for some certain particle size ,followed by calcinations process at (300,700,900) OC ,then milled and sieved. The selected sizes were D ~75 µm and D ~150. After that polyvinyl Al-Cohool solution prepared and used as a coated layer covered the Bentonite powder before applied as a filler ,followed by drying , milling and sieving for limited recommend sizes. polyvinyl chloride solutions were prepared and adding of modified Bentonite power at certain quantities were followed .Sheet of these variables on the mechanical and thermal properties of the prepared reinforced particular polyvinyl chloride composite
... Show MoreIn this paper , the CO2 laser receiver system is designed and studied, with wavelength laser 10.6 ?m in room temperature , and to evaluate the performance and discussion it via the package of optical design (ZEMAX), from its output the Spot Diagram is measured through RMS ,and from the Ray fan plot , the aberrations is found which is the normal error for the best focus named (under corrected ) , the other output was the Geometric Encircled Energy in the spot diagram . and found that the radius of spot diagram at 80% (R80%) from the total energy ,and focal shift .The designed system have high efficiency and low cost .
Complexes of some metal ions with 2-thiotolylurea were prepared in ethanolic medium using (1:1) (Metal : Ligand) ratio yielded series of neutral complexes as the general formula [M(L)Cl2]. The prepared complexes were identified by atomic absorption FT.IR, UV-Visble spectra, molar conductivity and magnetic properties. From the above data the tetrahedral structure was suggested for all complexes.
Collaborative learning in class‐based teaching presents a challenge for a tutor to ensure every group and individual student has the best learning experience. We present Group Tagging, a web application that supports reflection on collaborative, group‐based classroom activities. Group Tagging provides students with an opportunity to record important moments within the class‐based group work and enables reflection on and promotion of professional skills such as communication, collaboration and critical thinking. After class, students use the tagged clips to create short videos showcasing their group work activities, which can later be reviewed by the teacher. We report on a deployment of Group Tagging in an undergraduate Computing Scie
... Show MoreDuring this paper, new Schiff's base derivatives [F1-F5] were prepared through the reaction of dapsone drug with different substituted benzaldehyde compounds. Schiff's bases were then converted into 2,3-dihyroquinazolin-4(1H)-one derivatives [F6-F10] through the reaction with 2-amino benzoic acid in ethanol. The synthesized compounds were identified by their physical properties using UV-Vis, FT-IR and 1H-NMR analyses. The liquid crystalline properties of some prepared compounds revealed smectic and nematic phases. Using two separate bacterial species, Pseudomonas aeruginosa (Gram -ve) and Staphylococcus aureus<
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show More