Background: The anticancer impact of Epigallocatechin gallate (EGCG) the highly active polyphenol of green tea was abundantly studied. Though, the exact mechanism of its cytotoxicity is still under investigation. Objectives: Hence, the current study designed to investigate the molecular target of EGCG in HepG2 cells on thirteen autophagy- and/or apoptosis- related genes. Methods: The apoptosis detection analyses such as flow cytometry and dual apoptosis assay were used. The genes expression profile was explored by the real-time quantitative-PCR. Results: EGCG increases G0/G1 cell cycle arrest and the real-time apoptosis markers proteins leading to stimulate apoptosis in 70% of the treated HepG2 cells. The up-regulation was recorded in two of autophagy inhibitory genes (FOS-1, FOS-2) and apoptosis inducer gene (DDIT3). While the other ten genes expressed down-regulation after treatment. The down regulation was manifested in the genes of mitochondrial autophagy marker proteins (BNIP3, BNIP3L, and NBR1), the autophagy regulator genes (BIRC5, MAPK9), and the gene that implicated in protein biosynthesis and protein modification (ITGB1). The genes that have pro-apoptotic function in cells (CAPNS1, CFLAR, EIF4G, and RB1) were also showed down-regulation after treatment. Conclusion: Thus, the results demonstrated a potential effect of EGCG to induce apoptosis rather than autophagy in the treated HepG2 cells that could play a good target for therapy.
This research aimd to analyze the role of strategic entreprenenial on according to the external performance of a sample of Iraqi private banks, namely, (National Islamic Bank, Iraqi Ahli Bank, Baghdad Bank , Middle East Iraqi Investment Bank) has launched research in fundamental problem stems from the question seeking his response to the characterization of the problem which is improve banking performance through strategic entreprenenial and to achieve the goal of the research was to prepare a questionnaire included a number of questions about the independent research and approved variables accounting for the independent variable strategic entreprenenial and included four dimensions (entreprenenial culture), entreprenenial leader
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreAbstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show MoreDespite efforts to contain and manage the SARS-CoV-2 outbreak which was declared a public health emergency of international concern in January 2020 by the World Health Organization (WHO), the COVID-19 pandemic still remains a major global challenge. Patients who display the classical symptoms of the infection are easily identified, tested, isolated and monitored. However, many cases of infected asymptomatic patients have been documented. These patients are not easily identified even though many evidences suggest that they can spread the virus to others. How and why these COVID-19 asymptomatic presentations occur remain unclear. The many theories and views are conjectural, and supporting evidences are still needed. In this review, we
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More