G-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the Relative mutability revealed that isolate G12 was highly mutable by both mutagens. The Relative mutational results showed also that isolate G12 is more sensitive, except when recording rifampicin resistance as a genetic marker, and this pattern was similar to NTG.
This study looked at how the synthetic chitosan-AgNPs-Doxorubicin-folic acid combination affected the A549 cell line in terms of cytotoxicity and anticancer activity. By reducing silver nitrate (AgNO3) and biodegradable chitosan, silver nanoparticles were biosynthesized. The produced conjugate was examined by using FT-IR spectroscopy, atomic force microscopy (AFM), and field emission scanning electron microscopy (FE-SEM). The cytotoxicity assay for the viability of A549 cells revealed that the combination of chitosan, AgNPs, doxorubicin, and folic acid decrease cell viability in a dose-determined by method over 48 hours, which direct to a dependent reduce in the activity of A549 cells. The mechanism analysis of the impacted living cells lea
... Show MoreBiscuits are a global snack due to their convenience, variety, and durability. Biscuits with nutritious ingredients are in demand as customers become more health conscious. This change led to interest about utilizing agricultural by-products to enhance the nutritional value of widely consumed foods. Mango (Mangifera indica L.), a frequently cultivated tropical fruit, produces vital by-products during its processing, mainly comprising peels and kernels. The by-products, comprising around 35–60% of the mango fruit's weight, are high in bioactive compounds including dietary fiber, polyphenols, carotenoids, and essential fatty acids. Mango peels and kernels, even with their nutritional potential, frequently neglected, resulting in ris
... Show MoreBiscuits are a global snack due to their convenience, variety, and durability. Biscuits with nutritious ingredients are in demand as customers become more health conscious. This change led to interest about utilizing agricultural by-products to enhance the nutritional value of widely consumed foods. Mango (Mangifera indica L.), a frequently cultivated tropical fruit, produces vital by-products during its processing, mainly comprising peels and kernels. The by-products, comprising around 35–60% of the mango fruit's weight, are high in bioactive compounds including dietary fiber, polyphenols, carotenoids, and essential fatty acids. Mango peels and kernels, even with their nutritional potential, frequently neglected, resulting in ris
... Show MoreSummary
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, Muhammad, and upon all his family and companions.
The circle of taboos in the Jewish Sharia is wider than other laws, as the Jews have severe and very complicated rituals in the matter of food, which may not be found among other people of other religions, as the dietary laws that specify foods and drinks forbidden in the Jewish Sharia include very diverse topics. The Torah specified all these laws with several texts
The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreAccompanied Activity Economic Unity some negative effects in the environment of air, water and soil pollution of difficult to measure each other for being the external costs and to be avoided such expenditures should be measured or estimated value to be disclosed environmental costs at the heart of the financial statements of economic unity to inform managers and users of the financial statements on the implications costs environmental .and impact in reducing environmental costs and increase future income and economic unit, was based on research into the inductive approach through books, letters, journals and the internet to cover the theoretical framework of the research. And to the analyt
... Show MoreThe purpose of this study is to underline the progression and development of research regarding oxygen-containing heterocycles as well as the contribution that some oxygen-containing heterocycles have made as anticancer medicines. A series of publications about the antitumor effects of derivatives of heterocyclic compounds containing an oxygen atom, such as furan, benzofuran, oxazole, benzoxazole, and oxadiazole, were evaluated, and their anticancer activities showed encouraging results when compared to those of established standard treatments.
In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Abstract
The aim of the research is to identify the level of awareness and emotional experience among university students and to identify the effect of the educational program based on (Guttmann) model for developing awareness and emotional experience among university students by verifying the validity of the following zero hypotheses: 1) There are no statistically significant differences in the development of awareness and emotional experience among university students at the level of (0.05) between the mean scores of the experimental group in the pre and post-tests. 2) There are no statistically significant differences in the development of awareness and emotional experience among university students at the lev
... Show More