Background: In spite of all efforts, Non-small cell lung cancer (NSCLC) is a fatal solid tumor with a poor prognosis as of its high metastasis and resistance to present treatments. Tyrosine kinase inhibitors (TKI) such as erlotinib are efficient in treating NSCLC but the emergence of chemoresistance and adverse effects substantially limits their single use. Objective: in this study, the combination treatments of either 2-deoxy-D-glucose (2DG) or cinnamic acid (CINN) with erlotinib (ERL) were tested for their possible synergistic effect on the proliferation and migration capacity of NSCLC cells. Methods: In this study, NSCLC model cell line A549 was used to investigate the effects of single compounds and their combination on cell growth inhibition, clonogenic potential, and migration capacity. Next, the Combination index (CI) and the Dose-Reduction Index (DRI) were determined to determine the nature of the drug’s combination and to measure how many folds the dose could be lowered for each drug in a synergistic combination. Results: the combination treatment demonstrated more significant inhibition of viability of A549 cells compared to individual therapy. Our data show that CINN augments the sensitivity to erlotinib in all doses tested. The combination of 2DG or CINN with erlotinib also reduced the clonogenicity of NSCLC cells up to 67% and 85%, respectively, as compared to the erlotinib single treatment. Furthermore, CINN +ERL decreased the migratory ability of A549 cells by 3-fold and further induced much more apoptotic cell death phenotypes. Conclusion: in summary, co-administration of 2DG or cinnamic acid with erlotinib increases the inhibitory effects of erlotinib on NSCLC cell tumorigenicity and migration.
The house flies Musca domestica )Diptera:musidae) are the primary carrier of many pathogens such as cholera, typhoid, anthrax, and others. The use of chemical pesticides as a basic method of control leads to many problems at the environmental and health level. The use of safe alternatives to chemical pesticides has become an urgent necessity. The research aims to find biological alternatives that are environment-friendly and non-pathogenic to humans in controlling house flies through the possibility of extracting and diagnosing some secondary metabolites produced by the fungus Metarhizium anisopliae and testing their effects on the second larval stage of house flies using different treatment methods that include
... Show MoreAnalyze the relationship between genetic variations in the MTHFR gene at SNPs (rs1801131 and rs1801133) and the therapy outcomes for Iraqi patients with rheumatoid arthritis (RA). The study was conducted on a cohort of 95 RA Iraqi patients. Based on their treatment response, the cohort was divided into two groups: the responder (47 patients) and the nonresponder (48 patients), identified after at least three months of methotrexate (MTX) treatment. A polymerase chain reaction-restriction fragment length polymorphism (PCR–RFLP) technique was employed to analyze the MTHFR variations, specifically at rs1801133 and rs1801131. Overall, rs1801131 followed both codominant and dominate models, in which in
Stabilization of phenol trapped by agricultural waste: a study of the influence of ambient temperature on the adsorbed phenol
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The main purpose of the work is to analyse studies of themagnetohydrodynamic “MHD” flow for a fluid of generalized Burgers’ “GB” within an annular pipe submitted under impulsive pressure “IP” gradient. Closed form expressions for the velocity profile, impulsive pressure gradient have been taken by performing the finite Hankel transform “FHT” and Laplace transform “LT” of the successive fraction derivatives. As a result, many figures are planned to exhibit the effects of (different fractional parameters “DFP”, relaxation and retardation times, material parameter for the Burger’s fluid) on the profile of velocity of flows. Furthermore, these figures are compa
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show More