Preferred Language
Articles
/
bijps-1789
Role of Fasting Mimicking Diet in Farnesoid x Receptor for Suppressing Epithelial-to-Mesenchymal Transition, Cell Cycle Progression, and Viability of Prostate Cancer Cells
...Show More Authors

The systemic and resistant nature of metastatic castration-resistant prostate cancers (mCRPC) renders it largely incurable even after intensive multimodal therapy. Proliferation, survival, and epithelial-mesenchymal transition (EMT) are three fundamental events that are deeply linked to carcinogenesis.  Hence, it is necessary to find a new combination of several therapies, targeting those vital mechanisms without causing side effects. Significant research works have shown differential low expression of the metabolic Farnesoid X receptor (FXR) in primary and metastatic prostate cancer suggesting their importance in prostate pathogenesis. Obticholic acid (INT 747), a potent FXR agonist is widely used in primary biliary cholangitis, and Fasting mimicking Diet (FMD) both were drastically showed effects on different cancer progression. We hypothesized that FXR and FMD may inhibit proliferation and the metastatic phenotype in PC-3 prostate cancer cells. Analyses of the cell viability, cell cycle, migration, and matrigel invasion assays were performed to elucidate how INT 747 and /or FMD functions in prostate cancer. In this study, INT 747 treatment caused apoptotic morphological changes and significantly reduced the survival of PC-3 cells incubated in normal mediums.  Furthermore, we showed that the combination of the INT 747 and FMD was much more harmful to cancer cells than the treatment with INT 747 or FMD alone. Moreover, our study showed that INT 747 either alone or combined with FMD robustly induced cell cycle arrest at the S phase. Interestingly, the combination treatment on PC-3 cells not only showed several lines of evidence of apoptotic cells death but also inhibited carcinogenic potential as evaluated by impairment of spheroid formation capacity and delayed wound healing and matrigel invasion. At the cellular level, FXR activation resulted in down-regulation of procaspase -3, vimentin, and MMP9, which triggers apoptotic cell death, cell cycle arrest, and switch from mesenchymal to an epithelial phenotype. Collectively, FXR activation alone markedly decreases, and when combined with FMD abrogates the survival and carcinogenic potential of metastatic prostate cancer cells.

 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Dec 02 2013
Journal Name
Iraqi Medical Journal
Etiology and Antibiotic Sensitivity for Otitis Media in A Central Pediatric Teaching Hospital.
...Show More Authors

Publication Date
Wed Mar 16 2011
Journal Name
Alustath
The Search for Power in C. P. Snow The Light and the Dark
...Show More Authors

The Light and the Dark is the fourth novel in a series written by Charles Percy Snow where it tackles a phase of gifted scholar and remarkable individual Roy Calvert as he search for a source of power and meaning in life to relieve his inner turmoil. The character Roy Calvert is based on Snow's friend, Charles Allbery who exposes the message the character of Roy intends to convey in a certain phase of his life and the prophecy the novel carries amid catastrophe so widespread in the thirties of the twentieth century

View Publication
Publication Date
Fri Dec 01 2017
Journal Name
2017 11th Asian Control Conference (ascc)
ESO-based repetitive control for rejecting periodic and aperiodic disturbances in piezoelectric actuators
...Show More Authors

This paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Monatshefte Für Chemie - Chemical Monthly
Al-, Ga-, and In-decorated BP nanotubes as chemical sensors for 2-chloroethanol
...Show More Authors

B3LYP density functional is utilized for probing the effect of decorating Al, Ga, and In on the sensing performance of a boron phosphide nanotube (BPNT) in detecting the 2-chloroethanol (CHE) molecule. We predict that the interaction of pure BPNT with CHE is physisorption, and the sensing response (SR) of BPNT is approximately 6.3. The adsorption energy of CHE is about − 26.3 to − 91.1, − 96.6, and − 100.3 kJ/mol, when the Al, Ga, and In metals are decorated on the BPNT surface, respectively. This indicates that the decorated metals significantly strength the interaction. Also, the corresponding SR meaningfully rises to 19.4, 41.0, and 93.4, indicating that by increasing the atomic number of metals, the sensitivity i

... Show More
View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Research Journal Of Pharmacy And Technology
Estimating the plain and negative tendonography techniques for evaluating injured tendon in rabbit
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Suggestive Framework for Applying Performance and Programs Budget in Iraqi Government Units Environment
...Show More Authors

Abstract

This research  aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This  is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Popular naming for goods and materials in the Iraqi slang "A Semantic Study"
...Show More Authors

The current research is concerned with the prices of Goods and materials in the Iraqi slang a descriptive, lexicographic , and semantic study expressing the meanings of these names and their positions , as well as expressing the imaginations of Human mind , the popular mind in describing these goods with evaluating them besides the semantic of each word accordingly
The current research is divided into two parts , the first part is consisted of Vocalizations" words" That are arisen through cognitive naming that concentrate on the mental imaginations for the most important and sensitive such as colors , taste , shapes and forms impacts of Goods and materials according to users' ' taste for those words , on other hand, the second part of

... Show More
View Publication Preview PDF