The purified frog skin peptides were tested on leukemic patients lymphocytes, which revealed effects of cytotoxicity. Four frogs (Rana ridibunda) were stimulated by single intra-peritoneal injection of norepinephrine-HCl . Five different peptides;1(18) A, 2(19) L, 3(20) I,4(21) E and 5(22) Y were isolated and quantified. The peptide 3(20)I had 5.87% of hemolysis, while healthy human lymphocytes cytotoxic activity was for 2(19)L with inhibition( -10.4%).All peptides were subjected to polyacrylamide gel electrophoresis. The results revealed peptides 1(18)A, 2(19)L, 3(20)I which appeared as low as 10 KDa marker. Theoretically, the whole polypeptide had a molecular weight 7488.61 Dalton and contained on 62.405 amino acid (a.a). The peptide 4(21)E had a highest inhibitory effect(46%) on tumor cell line L20B. Furthermore , peptides effects on acute and chronic myeloid lymphocytic leukemia patients cell cultures revealed peptides selectivity in their action according to their net charge and functional group as reactant proton donor by the evidence of peptide 5(22)Y, 16.22 Dalton so it was either N—terminus (--NH2) or C—terminus (--OH) that led to cross cell membrane then acted as antigen mediated and activated cells in a high significant value (-142.37± 47.69)for acute myeloid lymphocytic leukemia .Both of peptides 3(20) I and 2(19) L were revealed a highly significant differences within Chr.40 and Chr. 22 of inhibition effects by testing volumes 15 µl and 10 µl . Those inhibition effects were due to peptides reaction with mitochondrial membrane which led to apoptosis . Conclusion; Frog skin peptides have a therapeutically worth for malignant diseases. Also some of peptides were activated lymphocytes may to cure immunodeficiency.
Increased epidemic when Akbari in his book Explanation in the expression of the Koran
In this study, we used Bayesian method to estimate scale parameter for the normal distribution. By considering three different prior distributions such as the square root inverted gamma (SRIG) distribution and the non-informative prior distribution and the natural conjugate family of priors. The Bayesian estimation based on squared error loss function, and compared it with the classical estimation methods to estimate the scale parameter for the normal distribution, such as the maximum likelihood estimation and th
... Show MoreDisabled people are among the most important groups that need attention, care, and financial and moral care. They cannot fulfill the requirement of life normally without care from a person to meet their special needs. The disability is either mental or physical. The Iraqi government has paid attention to this category by adopting a law for this category, represented by Law No. (38) for the year (2013), which keeps their rights and duties in Iraqi society by establishing institution of persons with disabilities and special needs of the Ministry of Labor and Social Affairs to create a modern society politically, socially, culturally or economically. In view of the importance of this group in society, the media reinforces the communit
... Show MoreCommon walnut (
Wastewater recycling for non-potable uses has gained significant attention to mitigate the high pressure on freshwater resources. This requires using a sustainable technique to treat natural municipal wastewater as an alternative to conventional methods, especially in arid and semi-arid rural areas. One of the promising techniques applied to satisfy the objective of wastewater reuse is the constructed wetlands (CWs) which have been used extensively in most countries worldwide through the last decades. The present study introduces a significant review of the definition, classification, and components of CWs, identifying the mechanisms controlling the removal process within such units. Vertical, horizontal, and hybrid CWs
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreIn this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More