Survivin, a member of inhibitor of apoptosis family is increasingly used as a target for cancer therapy design because it has a key role in cell growth and inhibition of cell apoptosis. Also it can be used as a biomarker for targeting cancer because it is found in almost all cancer but not normal cells. Our strategy was to design (computationally) a molecule to be used as survivin inhibitor. This molecule was named lead10 and was used furthermore to find (virtually) existing drugs with a good survivin inhibition activity.
The new novel polymers nanocomposites based modified chitosan (CS) blending with polyvinyl alcohol (PVA) and coated gold or silver nanoparticles (AuNPs), AgNPs) were synthesized from many sequence reactions as presented in (Scheme1, 2 and 3). By utilizing 1H-NMR spectroscopy, FTIR, and Field Emission Scanning electron microscope , the synthesized compounds have been identified. Molecular docking is studied, where operations are used to predict the binding status of compounds with the enzyme and to calculate the free energy (ΔG) of the compounds prepared. Also, the antibacterial activity regarding the synthesized compounds against two resistant pathogenic bacteria (G+) S. aureus and E. coli (G-) was examined in vitro compare with standard a
... Show MoreRecently, some prostate cancer patients have acquired resistance to the second -generation drugs (anzalutamide and apalutamide) prescribed for the treatment of this disease due to the emergence of the F876L mutation, which represents a challenge to modern medicine. In this study, a new series of 2-thiohydantoin derivatives were prepared through the reaction of different derivatives of maleimide (1c-4c) with isothiocyanate derivatives. The prepared compounds were diagnosed using FT-IR,1H-NMR ,13C-NMR, Mass spectra. The prepared series compounds has been studied against prostate cancer cells. The MTT assay was used to determine the activity of the prepared compounds against prostate cancer cells. The da
... Show MoreThe current research dealt with the symbolic significance and its effectiveness in the design of the industrial product, the aesthetic communicative discourse that embodies the imagination and human conscience. Whether according to what has been termed custom or what has been approved by traditions long ago, symbolism may be the main actor in linking the identifying components of the product. In addition, symbolism provides the user with the key to accessing a direct awareness of the product’s shape and function, as an identification of the product by stimulating the symbolic form of the consumer’s imagination and inviting him to To meditate in order to realize the implicit meaning behind these forms and thus achieve the symbolism of
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreAs tight gas reservoirs (TGRs) become more significant to the future of the gas industry, investigation into the best methods for the evaluation of field performance is critical. While hydraulic fractured well in TRGs are proven to be most viable options for economic recovery of gas, the interpretation of pressure transient or well test data from hydraulic fractured well in TGRs for the accurate estimation of important reservoirs and fracture properties (e.g. fracture length, fracture conductivity, skin and reservoir permeability) is rather very complex and difficult because of the existence of multiple flow profiles/regimes. The flow regimes are complex in TGRs due to the large hydraulic fractures n
The aim of this study is to utilize the electromembrane extraction (EME) system as a manner for effective removal of zinc from aqueous solutions. A novel and distinctive electrochemical cell design was adopted consisting of two glass chambers, a supported liquid membrane (SLM) housing a polypropylene flat membrane infused with 1-octanol and a carrier. Two electrodes were used, a graphite as anode and a stainless steel as cathode. A comprehensive examination of several influential factors including the choice of carrier, the applied voltage magnitude, the initial pH of the donor solution, and the initial concentration of zinc was performed, all in a concerted effort to ascertain their respective impacts on the efficiency of zinc elim
... Show MoreThis research aims to analyse the problem of organizations in general and universities in particular, in dealing with �quality subjects� in a world where these organizations face the risks of becoming side lined and possibly vanished without looking for solutions that allow them to move in an open arena where change becomes the key to those solutions. Change here must be strategic and planning must adopts a way for organizations to develop mechanisms to manage change itself. Management leaders play a central role in achieving the principle required to chart new trends for universities in dealing with quality as a strategy that allows excellence and competition in light of the success of the processes of change. Change through reengineer
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreA network (or formally a graph) can be described by a set of nodes and a set of edges connecting these nodes. Networks model many real-world phenomena in various research domains, such as biology, engineering and sociology. Community mining is discovering the groups in a network where individuals group of membership are not explicitly given. Detecting natural divisions in such complex networks is proved to be extremely NP-hard problem that recently enjoyed a considerable interest. Among the proposed methods, the field of evolutionary algorithms (EAs) takes a remarkable interest. To this end, the aim of this paper is to present the general statement of community detection problem in social networks. Then, it visits the problem as an optim
... Show MoreIn networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f
... Show More