The study included selection six species of the fungi related to Pleurotus genus were evaluated for their ability to production of Pleurotin, one of them, Pleurotus ostreatus (P.11) was isolated and identified in the present study. Pleurotin was extracted with screening by Thin Layer Chromatography (TLC) and quantification High Performance Liquid Chromatography (HPLC). Cytotoxicity of Pleurotin extracted from P. ostreatus (P.11) grown in different sugar sources (galactose, mannitol, sucrose, dextrose and lactose) liquid media was test against three selected cancer cell lines, CaSki, MCF-7 and A549 addition to Human Non Cancer Fibroblast Cell Line (MRC-5). Pleurotin of P. ostreatus (P.11) grown in galactose induced the significant highest growth inhibition against all three cancer cell lines MCF-7 CaSki, and A549 at 72 h treatment period with IC50 29.84 ± 2.37, 30.25 ± 2.40 and 37.60 ± 2.65 μg/ml respectively when the P≤0.01, while it showed no adverse effect on the non-cancer human fibroblast cell line MRC-5 with IC50 >200 μg/ml. Cytotoxicity of Pleurotin was compared with cytotoxicity of the positive controls (chemotherapeutic drugs) including Doxorubicin against CaSki and A549 cell lines and Cisplatin against MCF-7 and MRC-5 cell lines, although IC50 of pleurotin was higher (30.25 ± 2.40 and 37.60 ± 2.65 μg/ml) than Doxorubicin (0.18 ± 0.00 and 1.10 ± 0.02 μg/ml) of CaSki and A549 cell lines, respectively, and also IC50 of Pleurotin was higher (29.84 ± 1.73 and >200 μg/ml) than Cisplatin (8.20 ± 0.25 and 8.88 ± 0.13 μg/ml) of MCF-7 and MRC-5 cell lines, respectively, pleurotin was natural product from an edible fungus while Doxorubicin and Cisplatin were chemical drugs.
The open hole well log data (Resistivity, Sonic, and Gamma Ray) of well X in Euphrates subzone within the Mesopotamian basin are applied to detect the total organic carbon (TOC) of Zubair Formation in the south part of Iraq. The mathematical interpretation of the logs parameters helped in detecting the TOC and source rock productivity. As well, the quantitative interpretation of the logs data leads to assigning to the organic content and source rock intervals identification. The reactions of logs in relation to the increasing of TOC can be detected through logs parameters. By this way, the TOC can be predicted with an increase in gamma-ray, sonic, neutron, and resistivity, as well as a decrease in the density log
... Show MoreAbstract
This study aims to find the relationships between social capital (social network, social trust, shared goals) and knowledge sharing (knowledge Donating, knowledge collecting) as independent variables and their impact on improving the quality of educational services (academic staffs quality, Quality of teaching methods and study curriculums). This research is an important, because it attempts to identify the relationship between social capital and the knowledge sharing and their effect on improving the quality of educational service for universities. The study problem was determined in several questions related to the nature of the correlation relationship - the impact between the different independent variables (
... Show MoreThe researcher tried to show the importance of obligation with the rules of professional conduct set by the Association of Accountants and Auditors of Iraqis when expressing an opinion the financial statements submitted tax administration and enhance the confidence of these lists, and adopted in the tax settling accounts process and its impact on tax revenues, and touched a researcher at the theoretical side of the search to the problem of research and of my Is there a trace of non- not to obligation by the rules of professional conduct in Iraq affect the tax revenue with the rules of professional conduct in tax revenue for companies research sample, the research aims to study the rules of professional conduct set by the Associatio
... Show Morebstract This study was performed to isolate and identify the Burkholderia cepacia from rhizosphers of different plants and study their ability to produce Siderophore, the study was also aimed to assess the antifungal activity of the bacterial filtrate and extracts of the isolates against some pathogenic fungi. The isolate which showed higher inhibitory effects was selected for extraction of some active metabolites produced by it, and evaluate the activity in vitro, via inhibition of the growth of the fungi using different concentrations of extract (50, 100, 200 )µL/ml , The results showed that out of (250) samples of soil , (8) isolates (3.2%) gave positive
... Show MoreThe study aims at knowing the actual uses of instructional technology in teaching history subject in the colleges of education for humanities from the college staff members' perspectives and their attitudes towards it. The sample of the study consisted of (24) instructors from the Colleges of Education for the Humanities, the College of Basic Education- Haditha and the College of Education for Women, the study used the descriptive method, and the questionnaire was consisted of (50) items, and the psychometric properties of the instrument of the study were extracted. The researchers used the appropriate statistical means to analyze the data, and the results of the study showed the following: the teaching staff attitudes towards the use of
... Show MoreBecause the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreObjective: To determine the effectiveness of an Educational Program in Enhancing Nurse’s Knowledge about Occupational Health Hazards at Medical City Hospitals in Baghdad City.
Methodology: The present study employed a quasi-experimental design held at Medical City Hospitals in Baghdad City. A non-probability sample (convenience sample) consisted of (60) nurse. Data were collected by using a self-report questionnaire which consisted of six parts (a) socio-demographic characteristics (b) physical hazards knowledge (c) chemical hazards knowledge (d) biological hazards knowledge (e) psychological hazards knowledge and (f) mechanical hazards knowledge. Data were analyzed using the statistical packag
... Show More