Preferred Language
Articles
/
bijps-1827
Autophagy or Apoptosis: Anticancer Molecular Mechanism of Epigallocatechin Gallate with Natural Polyphenol Effect on HepG2 Cells Viability
...Show More Authors

Background: The anticancer impact of Epigallocatechin gallate (EGCG) the highly active polyphenol of green tea was abundantly studied.  Though, the exact mechanism of its cytotoxicity is still under investigation. Objectives: Hence, the current study designed to investigate the molecular target of EGCG in HepG2 cells on thirteen autophagy- and/or apoptosis- related genes. Methods: The apoptosis detection analyses such as flow cytometry and dual apoptosis assay were used. The genes expression profile was explored by the real-time quantitative-PCR. Results: EGCG increases G0/G1 cell cycle arrest and the real-time apoptosis markers proteins leading to stimulate apoptosis in 70% of the treated HepG2 cells. The up-regulation was recorded in two of autophagy inhibitory genes (FOS-1, FOS-2) and apoptosis inducer gene (DDIT3). While the other ten genes expressed down-regulation after treatment. The down regulation was manifested in the genes of mitochondrial autophagy marker proteins (BNIP3, BNIP3L, and NBR1), the autophagy regulator genes (BIRC5, MAPK9), and the gene that implicated in protein biosynthesis and protein modification (ITGB1). The genes that have pro-apoptotic function in cells (CAPNS1, CFLAR, EIF4G, and RB1) were also showed down-regulation after treatment. Conclusion: Thus, the results demonstrated a potential effect of EGCG to induce apoptosis rather than autophagy in the treated HepG2 cells that could play a good target for therapy. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
The Academic Assistance and its Relationship with the College and Stage Variables at the Department of Kindergarten’s Students: نبأ مجيد مطشر, و جميلة رحيم عبد
...Show More Authors

The study aims at knowing students’ academic assistance at the Department of Kindergarten. It further aims to know the difference of academic assistance among these students with respects to variables like (college of education for women, Baghdad, Thi-Qar). It also aims to know about the difference according to the academic level variable, in addition to its relation to some other variables. To achieve the objectives of the study, a number of university female students were selected from both Baghdad an Thi-Qar Universities in the academic year 2019-2020. The sample of the participants consisted of (400) students from the (second, third, and fourth) levels. To measure the study variable represented by the concept of academic assistance

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Preparation, Study and Theortical Treatment of Co(II) Ni(II) Cu(II) and Zn(II) Schiff Base Coplexes with Sodium [N-(hydroxyl naphtholidine) Glycine imino].
...Show More Authors

Anew Schiff base (NaHL) has been prepared from the reaction between the salt of amino acid glycine with 2-hydroxy naphthaldehyde. By tridentate Schiff base of (ONO), donors were characterized by using U.V and spectrophotometer techniques. Complexes of Co(II) Ni(II) Cu(II) and Zn(II) ion with the ligand have been prepared, these complexes were identified by infrared, electronic spectral data, elemental analysis, magnetic moments, and molar conductivity measurements. It is concluded from the elemental analysis that all the complexes have (1:2) [metal:ligand] molar ratios, octahedral, with the exception to Zn(II) complex which have (1:1)[metal:ligand] molar ratio.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 19 2024
Journal Name
Baghdad Science Journal
Synthesis, Characterization, and Thermal Studying of VO(II), Cu(II), Zn (II), Cd(II), and Au (III) Complexes with Azo Dye and Evaluation as Antioxidants
...Show More Authors

حضرت معقدات كل من الفنادايل, الخارصين, النحاس والكادميوم بتكافؤهم الثنائي والذهب بتكافؤه الثلاثي بأستخدام صبغة ازوجديدة (6،4،2-ثلاثي هيدروكسي-3-((3-هيدروكسي فنيل) ثنائي زينيل ) فنيل ) ايثان-1-اون المحضرة من ملح الديازونيوم مع ٦,٤,٢- ثلاثي هيدروكسي اسيتوفينون بعد عزل (E)-1-(2,4,6-trihydroxy-3-((3-hydroxyphenyl)diazenyl)phenyl)ethan-1-one تم تشخيصها بواسطة الطرق الطيفية المتاحة  والتقنيات التشخيصية لكل من التحليل الدقيق للعناصرواطياف كل من ال

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Comparison the effectiveness of using a magnetic field to control theColi phages isolated from rivulet water with water-treatment using magnetic field added iron filings
...Show More Authors

The present study aimed to use the magnetic field and nanotechnology in the field of water purification, which slots offering high efficiency to the possibility of removing biological contaminants such as viruses and bacteria rather than the use of chemical and physical transactions such as chlorine and bromine, and ultraviolet light and boiling and sedimentation and distillation, ozone and others that have a direct negative impact on human safety and the environment. Where they were investigating the presence in water samples under study Coli phages using Single agar layer method and then treated samples positive for phages to three types of magnetic field fixed as follows (North Pole - South Pole - Bipolar) and compare the re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation of the Relation between Asthma, Obesity and Leptin Level in Iraqi Asthmatic Patients and the Main Risk Factors that are Associated with Leptin Level
...Show More Authors

This study tries to clear the correlation and association between asthma, obesity and leptin levels. Also it will work to indicate the main risk factors which play role in the elevation of leptin level within asthmatic patients.  This is a case control study conducted on (38) asthmatic patients and (20) healthy control who were closely similar by age, gender and BMI. The main statistical tests used were student t test, linear regression test and correlation test. Significance was set at P < 0.05. Sampling method used for this study was convenience sampling method.  The main results of this study show a significant association and positive correlation between age (old age  â‰¥ 40 ye

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
An Analytical Study for Urban Gentrification on Local Urban Centers
...Show More Authors

The urban Gentrification  is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref