Despite the G protein-coupled receptors (GPCRs) being the largest family of signalling proteins at the surface of cells, their potential to be targeted in cancer therapy is still under-utilised. This review highlights the contribution of these receptors to the process of oncogenesis and points to some likely challenges that might be encountered in targeting them. GPCR-signalling pathways are often complex and can be tissue-specific. Cancer cells hijack these communication networks to their proliferative advantage. The role of selected GPCRs in the different hallmarks of cancer is examined to highlight the complexity of targeting these receptors for therapeutic benefit. Our increasing knowledge of the mechanisms governing the molecular functions of GPCRs may help to identify new targets to treat specific types of cancers.
The aim of the present study was to develop theophylline (TP) inhalable sustained delivery system by preparing solid lipid microparticles using glyceryl behenate (GB) and poloxamer 188 (PX) as a lipid carrier and a surfactant respectively. The method involves loading TP nanoparticles into the lipid using high shear homogenization – ultrasonication technique followed by lyophilization. The compositional variations and interactions were evaluated using response surface methodology, a Box – Behnken design of experiment (DOE). The DOE constructed using TP (X1), GB (X2) and PX (X3) levels as independent factors. Responses measured were the entrapment efficiency (% EE) (Y1), mass median
... Show MoreTHE ACTUAL SOCIETY MODEL
Our society model has been showing signs of exhaustion since the end of the XX century. The recent appearance of the Covid-19 virus is another consequence of humanity's distance from Nature and the environment it inhabits. Also, climate change, environmental deterioration, loss of biodiversity, overexploitation of natural resources, and social inequality are some of the consequences derived from this separation between society and Nature. We must change our operating habits. Inevitably from a society based on the market, hyper consumption, fossil energy and individual enrichment at all costs, we will have to change to another
... Show MoreComputer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, including the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you
... Show More|
Measurement of radon concentration level was carried out in 40 houses in Al – Najaf city during summer season of 2012. Long term measurement of indoor of old building radon concentrations have been taken, using a previously calibrated passive diffusion dosimeters containing CR – 39 solid state nuclear track detectors which are very sensitive for alpha particles. The measurement of the indoor radon concentration obtained in summer in these regions ranged from 11.654±4.216 Bq.m-3 to 53.610±8.777 Bq.m-3. The results were within universally permitted levels. |
The unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreDecision-making in Operations Research is the main point in various studies in our real-life applications. However, these different studies focus on this topic. One drawback some of their studies are restricted and have not addressed the nature of values in terms of imprecise data (ID). This paper thus deals with two contributions. First, decreasing the total costs by classifying subsets of costs. Second, improving the optimality solution by the Hungarian assignment approach. This newly proposed method is called fuzzy sub-Triangular form (FS-TF) under ID. The results obtained are exquisite as compared with previous methods including, robust ranking technique, arithmetic operations, magnitude ranking method and centroid ranking method. This
... Show MoreThe heat exchanger is a device used to transfer heat energy between two fluids, hot and cold. In this work, an output feedback adaptive sliding mode controller is designed to control the temperature of the outlet cold water for plate heat exchanger. The measurement of the outlet cold temperature is the only information required. Hence, a sliding mode differentiator was designed to estimate the time derivative of outlet hot water temperature, which it is needed for constructing a sliding variable. The discontinuous gain value of the sliding mode controller is adapted according to a certain adaptation law. Two constraints which imposed on the volumetric flow rate of outlet cold (control input) were considered within the rules of the proposed
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More