Protein arginine methyltransferases (PRMTs) play important roles in transcription, splicing, DNA damage repair, RNA biology, and cellular metabolism. Thus, PRMTs have been attractive targets for various diseases. In this study, we reported the design and synthesis of a potent pan-inhibitor for PRMTs that tethers a thioadenosine and various substituted guanidino groups through a propyl linker. Compound II757 exhibits a half-maximal inhibition concentration (IC50) value of 5 to 555 nM for eight tested PRMTs, with the highest inhibition for PRMT4 (IC50 = 5 nM). The kinetic study demonstrated that II757 competitively binds at the SAM binding site of PRMT1. Notably, II757 is selective for PRMTs over a panel of other methyltransferases, w
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreIn this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Background: One of the drawbacks of vital teeth bleaching is color stability. The aim of the present study was to evaluate the effects of tea and tomato sauce on the color stability of bleached enamel in association with the application of MI Paste Plus (CPP-ACPF). Materials and Methods: Sixty enamel samples were bleached with 10% carbamide peroxide for two weeks then divided into three groups (A, B and C) of 20 samples each. After bleaching, the samples of each group were subdivided into two subgroups (n=10). While subgroups A1, B1 and C1 were kept in distilled water, A2, B2, and C2 were treated with MI Paste Plus. Then, the samples were immersed in different solutions as follow: A1 and A2 in distilled water (control); B1 and B2 in black
... Show MoreThe research aims to define the images of financial aid that it provides within their tasks (central banks to governments) and how it can affect the indicators of banking stability, as well as monitoring the levels of banking stability in the Iraqi economy through the indicators used by the Central Bank of Iraq, and the importance of research in banking stability lies in Iraq, because any decrease in the movement of the aggregate banking stability index will reflect negatively on the financial sector in Iraq. Therefore, the Central Bank sought to provide financial aid to the government through a group of components, some of which are represented by initiatives that contribute to revitalizing the national economy and the other hel
... Show MoreBackground: Change in palatal vault shape and Reinforcement of high impact acrylic denture base resin may in turn affect the dimensional accuracy of acrylic resin and affecting the fitness of the denture.This study evaluated tostudy the effect of fiber reinforcement for high-impact acrylic resin denture base with different palatal vault shapes on adaptation or gap space between the denture base and the stone cast and compare with non-fiber reinforcement and effect of palatal vault shapes on adaptation of non-reinforced and fiber reinforced high impact denture base acrylic resin Material and method: Three different palatal vault shapes were prepared on standard casts using CNC (computer numerical control) machine. 60 samples of heat polymeri
... Show More