Preferred Language
Articles
/
ijs-9472
Test the Cytotoxicity of Pleurotin Extracted from an Edible Mushroom Pleurotus osteratus Against Three Human Carcinoma Cell Line
...Show More Authors

The study included selection six species of the fungi related to Pleurotus genus were evaluated for their ability to production of Pleurotin, one of them, Pleurotus ostreatus (P.11) was isolated and identified in the present study. Pleurotin was extracted with screening by Thin Layer Chromatography (TLC) and quantification High Performance Liquid Chromatography (HPLC). Cytotoxicity of Pleurotin extracted from P. ostreatus (P.11) grown in different sugar sources (galactose, mannitol, sucrose, dextrose and lactose) liquid media was test against three selected cancer cell lines, CaSki, MCF-7 and A549 addition to Human Non Cancer Fibroblast Cell Line (MRC-5). Pleurotin of P. ostreatus (P.11) grown in galactose induced the significant highest growth inhibition against all three cancer cell lines MCF-7 CaSki, and A549 at 72 h treatment period with IC50 29.84 ± 2.37, 30.25 ± 2.40 and 37.60 ± 2.65 μg/ml respectively when the P≤0.01, while it showed no adverse effect on the non-cancer human fibroblast cell line MRC-5 with IC50 >200 μg/ml. Cytotoxicity of Pleurotin was compared with cytotoxicity of the positive controls (chemotherapeutic drugs) including Doxorubicin against CaSki and A549 cell lines and Cisplatin against MCF-7 and MRC-5 cell lines, although IC50 of pleurotin was higher (30.25 ± 2.40 and 37.60 ± 2.65 μg/ml) than Doxorubicin (0.18 ± 0.00 and 1.10 ± 0.02 μg/ml) of CaSki and A549 cell lines, respectively, and also IC50 of Pleurotin was higher (29.84 ± 1.73 and >200 μg/ml) than Cisplatin (8.20 ± 0.25 and 8.88 ± 0.13 μg/ml) of MCF-7 and MRC-5 cell lines, respectively, pleurotin was natural product from an edible fungus while Doxorubicin and Cisplatin were chemical drugs.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
2018 Third Scientific Conference Of Electrical Engineering (scee)
An Intelligent Cognitive System Design for Mobile Robot based on Optimization Algorithm
...Show More Authors

View Publication
Scopus (7)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials & Continua
An Optimal Method for Supply Chain Logistics Management Based on Neural Network
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Mar 01 2005
Journal Name
Saudi Medical Journal
Condylomata acuminata in infants and young children. Topical podophyllin an effective therapy.
...Show More Authors

KE Sharquie, MM Al-Waiz, AA Al-Nuaimy, Saudi medical journal, 2005 - Cited by 8

View Publication
Publication Date
Wed Jul 01 2015
Journal Name
The Sai 2015
An optimal defuzzification method for interval type-2 fuzzy logic control scheme
...Show More Authors

Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks
...Show More Authors

<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (11)
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Topical 15% zinc sulfate solution is an effective therapy for feet odor
...Show More Authors

KE Sharquie, AA Noaimi, SD Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 15

View Publication
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
2022 International Conference On Data Science And Intelligent Computing (icdsic)
An improved Bi-LSTM performance using Dt-WE for implicit aspect extraction
...Show More Authors

In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref