The study included selection six species of the fungi related to Pleurotus genus were evaluated for their ability to production of Pleurotin, one of them, Pleurotus ostreatus (P.11) was isolated and identified in the present study. Pleurotin was extracted with screening by Thin Layer Chromatography (TLC) and quantification High Performance Liquid Chromatography (HPLC). Cytotoxicity of Pleurotin extracted from P. ostreatus (P.11) grown in different sugar sources (galactose, mannitol, sucrose, dextrose and lactose) liquid media was test against three selected cancer cell lines, CaSki, MCF-7 and A549 addition to Human Non Cancer Fibroblast Cell Line (MRC-5). Pleurotin of P. ostreatus (P.11) grown in galactose induced the significant highest growth inhibition against all three cancer cell lines MCF-7 CaSki, and A549 at 72 h treatment period with IC50 29.84 ± 2.37, 30.25 ± 2.40 and 37.60 ± 2.65 μg/ml respectively when the P≤0.01, while it showed no adverse effect on the non-cancer human fibroblast cell line MRC-5 with IC50 >200 μg/ml. Cytotoxicity of Pleurotin was compared with cytotoxicity of the positive controls (chemotherapeutic drugs) including Doxorubicin against CaSki and A549 cell lines and Cisplatin against MCF-7 and MRC-5 cell lines, although IC50 of pleurotin was higher (30.25 ± 2.40 and 37.60 ± 2.65 μg/ml) than Doxorubicin (0.18 ± 0.00 and 1.10 ± 0.02 μg/ml) of CaSki and A549 cell lines, respectively, and also IC50 of Pleurotin was higher (29.84 ± 1.73 and >200 μg/ml) than Cisplatin (8.20 ± 0.25 and 8.88 ± 0.13 μg/ml) of MCF-7 and MRC-5 cell lines, respectively, pleurotin was natural product from an edible fungus while Doxorubicin and Cisplatin were chemical drugs.
The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreOne study whose importance has significantly grown in recent years is lip-reading, particularly with the widespread of using deep learning techniques. Lip reading is essential for speech recognition in noisy environments or for those with hearing impairments. It refers to recognizing spoken sentences using visual information acquired from lip movements. Also, the lip area, especially for males, suffers from several problems, such as the mouth area containing the mustache and beard, which may cover the lip area. This paper proposes an automatic lip-reading system to recognize and classify short English sentences spoken by speakers using deep learning networks. The input video extracts frames and each frame is passed to the Viola-Jone
... Show MoreArtificial pancreas is simulated to handle Type I diabetic patients under intensive care by automatically controlling the insulin infusion rate. A Backstepping technique is used to apply the effect of PID controller to blood glucose level since there is no direct relation between insulin infusion (the manipulated variable) and glucose level in Bergman’s system model subjected to an oral glucose tolerance test by applying a meal translated into a disturbance. Backstepping technique is usually recommended to stabilize and control the states of Bergman's class of nonlinear systems. The results showed a very satisfactory behavior of glucose deviation to a sudden rise represented by the meal that increase the blood glucose
... Show More
The chemical, physical and toxicological effects on health of synthetic dyes that used as tracking dye in the electrophoresis requires seriously search about alternative tracking dye. The present study is aimed to find an alternative dye from safe food dyes which commonly used in food coloring. Five dyes were selected depending on their chemical properties and the availability in local market: Brilliant Blue FCF, Tartrazine, Sunset Yellow FCF, Carmoisine, and green traditional, three dyes were chosen to be mixed as loading buffer: Brilliant Blue FCF, Sunset Yellow FCF as a basic because it give the whole range size of most traditional loading buffers that available in market, and adding the Carmoisine as a new indicator for the bands less t
... Show MoreThis research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).
In networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f
... Show MoreThe need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show More