Preferred Language
Articles
/
bijps-1827
Autophagy or Apoptosis: Anticancer Molecular Mechanism of Epigallocatechin Gallate with Natural Polyphenol Effect on HepG2 Cells Viability
...Show More Authors

Background: The anticancer impact of Epigallocatechin gallate (EGCG) the highly active polyphenol of green tea was abundantly studied.  Though, the exact mechanism of its cytotoxicity is still under investigation. Objectives: Hence, the current study designed to investigate the molecular target of EGCG in HepG2 cells on thirteen autophagy- and/or apoptosis- related genes. Methods: The apoptosis detection analyses such as flow cytometry and dual apoptosis assay were used. The genes expression profile was explored by the real-time quantitative-PCR. Results: EGCG increases G0/G1 cell cycle arrest and the real-time apoptosis markers proteins leading to stimulate apoptosis in 70% of the treated HepG2 cells. The up-regulation was recorded in two of autophagy inhibitory genes (FOS-1, FOS-2) and apoptosis inducer gene (DDIT3). While the other ten genes expressed down-regulation after treatment. The down regulation was manifested in the genes of mitochondrial autophagy marker proteins (BNIP3, BNIP3L, and NBR1), the autophagy regulator genes (BIRC5, MAPK9), and the gene that implicated in protein biosynthesis and protein modification (ITGB1). The genes that have pro-apoptotic function in cells (CAPNS1, CFLAR, EIF4G, and RB1) were also showed down-regulation after treatment. Conclusion: Thus, the results demonstrated a potential effect of EGCG to induce apoptosis rather than autophagy in the treated HepG2 cells that could play a good target for therapy. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Land cover change detection using satellite images based on modified spectral angle mapper method
...Show More Authors

This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio

... Show More
Scopus (3)
Scopus
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Gas Sensor for Hazardous Nitrogen Dioxide Based on TiO2 Nanotube Synthesis via Electrochemical Method
...Show More Authors

Because of the quick growth of electrical instruments used in noxious gas detection, the importance of gas sensors has increased. X-ray diffraction (XRD) can be used to examine the crystal phase structure of sensing materials, which affects the properties of gas sensing. This contributes to the study of the effect of electrochemical synthesis of titanium dioxide (TiO2) materials with various crystal phase shapes, such as rutile TiO2 (R-TiO2NTs) and anatase TiO2 (A-TiO2NTs). In this work, we have studied the effect of voltage on preparing TiO2 nanotube arrays via the anodization technique for gas sensor applications. The results acquired from XRD, energy dispersion spectro

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
High Transaction Rates Performance Evaluation for Secure E-government Based on Private Blockchain Scheme
...Show More Authors

 

The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (63)
Crossref (62)
Scopus Clarivate Crossref
Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Sep 16 2020
Journal Name
F1000research
Green tea influence on iron overload in thalassemia intermedia patients: a randomized controlled trial
...Show More Authors

Background: Although iron chelation therapies have been available for many years for thalassemia intermedia patients, iron accumulation remains the major cause of death. Therefore, the need for additional chelation options is in demand. This randomized controlled study aimed to understand the effects of green tea on iron balance in thalassemia intermedia patients.

Methods: Using a random selection method, 141 thalassemia intermedia patients were initially screened for inclusion in this trial; only 68 patients included after applying exclusion criteria. Two equal groups were generated (n=34/group): green tea (three cups/day after meals) + usual treatment (deferasirox iron chelat

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Applied And Computational Mathematics
Reliable computational methods for solving Jeffery-Hamel flow problem based on polynomial function spaces
...Show More Authors

Scopus (7)
Crossref (1)
Scopus Clarivate Crossref