Background: In spite of all efforts, Non-small cell lung cancer (NSCLC) is a fatal solid tumor with a poor prognosis as of its high metastasis and resistance to present treatments. Tyrosine kinase inhibitors (TKI) such as erlotinib are efficient in treating NSCLC but the emergence of chemoresistance and adverse effects substantially limits their single use. Objective: in this study, the combination treatments of either 2-deoxy-D-glucose (2DG) or cinnamic acid (CINN) with erlotinib (ERL) were tested for their possible synergistic effect on the proliferation and migration capacity of NSCLC cells. Methods: In this study, NSCLC model cell line A549 was used to investigate the effects of single compounds and their combination on cell growth inhibition, clonogenic potential, and migration capacity. Next, the Combination index (CI) and the Dose-Reduction Index (DRI) were determined to determine the nature of the drug’s combination and to measure how many folds the dose could be lowered for each drug in a synergistic combination. Results: the combination treatment demonstrated more significant inhibition of viability of A549 cells compared to individual therapy. Our data show that CINN augments the sensitivity to erlotinib in all doses tested. The combination of 2DG or CINN with erlotinib also reduced the clonogenicity of NSCLC cells up to 67% and 85%, respectively, as compared to the erlotinib single treatment. Furthermore, CINN +ERL decreased the migratory ability of A549 cells by 3-fold and further induced much more apoptotic cell death phenotypes. Conclusion: in summary, co-administration of 2DG or cinnamic acid with erlotinib increases the inhibitory effects of erlotinib on NSCLC cell tumorigenicity and migration.
One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreIn this work, the effects of size, and temperature on the linear and nonlinear optical properties in InGaN/GaN inverse parabolic and triangular quantum wells (IPQW and ITQW) for different concentrations at the well center were theoretically investigated. The indium concentrations at the barriers were fixed to be always xmax = 0.2. The energy levels and their associated wave functions are computed within the effective mass approximation. The expressions of optical properties are obtained analytically by using the compact density-matrix approach. The linear, nonlinear, and total absorption coefficients depending on the In concentrations at the well center are investigated as a function of the incident photon energy for different
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreAbstract
This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per
... Show MoreThis project sought to fabricate a flexible gas sensor based on a short functionalized multi-walled carbon nanotubes (f-MWCNTs) network for nitrogen dioxide gas detection. The network was prepared by filtration from the suspension (FFS) method and modified by coating with a layer of polypyrrole conductive polymer (PPy) prepared by the oxidative chemical polymerization to improve the properties of the network. The structural, optical, and morphological properties of the f-MWCNTs and f-MWCNTs/PPy network were studied using X-ray diffraction (XRD), Fourie-transform infrared (FTIR), with an AFM (atomic force microscopy). XRD proved that the structure of f-MWCNTs is unaffected by the synthesis procedure. The FTIR spectra verified the existence o
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreWomen are considered the real power to build societies, as they are half of society, and it is their responsibility to raise generations، as human history testifies to the recording of great names with their giving and achievement in various scientific, social and humanitarian disciplines. Because of the importance of women in our lives, society must give them special care, whether at home or within the community structure to which they belong, so that they contribute to the image that brings about a transformation in the public scene, as well as providing them with support to take charge of bringing about change themselves, and this explains the interest of the press at all levels. Women's issues and topics through various journal
... Show More