This study confirms the ubiquitin conjugating enzyme 2B (Rad6) plays a significant role in the DNA repair pathway also because the ubiquitin-conjugating pathway. The DNA repair pathway could be a variety of bypass repair mechanism where the broken base pair is bypassed by permitting the replication fork to labor under the site of injury. This is often done by a shift mechanism wherever deoxyribonucleic acid enzyme - δ is switched with DNA enzyme - η (DNAP - η). Site of DNAP - η is massive enough to permit the broken ester to labor under, and so bypass the broken nucleotide. However, this is often potential solely through the involvement of Proliferating cell nuclear antigen (PCNA) that could be a processivity issue and it acts as a platform for the achievement of DNAP - η. Once the DNAP - η is recruited, the DNA bypass mechanism is initiated. PCNA is activated by ubiquitination of essential amino acid residue by Rad6-Rad18 advanced. Once Rad6 is ubiquitylated, it forms complex with Rad18 and this complex then ubiquitylated PCNA that successively initiates error-free DNA bypass repair. Typically, attributable to exposure to radiation the Rad6-Rad18 advanced is not shaped. Within the absence of Rad6-Rad18 advanced, PCNA isn't activated and DNAP - η isn't recruited at the harm the site. Therefore, deoxyribonucleic acid bypass mechanism isn't initiated. We tend to intend the activation of Rad6 by the triazole compounds to make a complex with Rad18 and ubiquitination of PCNA to initiate deoxyribonucleic acid bypass repair
Background: The novel coronavirus disease (COVID-19) is caused by Severe acute respiratory syndrome coronavirus 2 (SARS-Cov2) which utilizes angiotensin converting enzyme2 (ACE2) to invade the host cells. This membrane-bound peptidase is widely distributed in the body; its activity antagonizes the renin-angiotensin-aldosterone system (RAAS). Once SARS-Cov2 enters the cell, it causes downregulation of ACE2, resulting in the unopposed activation of RAAS. The unregulated activity of the RAAS system can deteriorate the prognosis in COVID-19 patients. A soluble form of ACE2 (sACE2) was reported to have a role in the SARS-Cov2 invasion of the susceptible cells.
Aim of the study: This study aims to inve
... Show MoreBackground: Healing of a tooth extraction socket is a complex process involving tissue repair and regeneration. It involves chemotaxis of appropriate cells into the wound, Transformation of undifferentiated mesenchymal cells to osteoprogenitor cells, proliferation and differentiation of committed bone forming cells, extracellular matrix synthesis, mineralization of osteoid, maturation and remodeling of bone. These cellular events are precisely controlled and regulated by specific signaling molecules. Some of these like transforming growth factor beta (TGF-?), vascular endothelial growth factor (VEGF), bone morphogenetic proteins (BMP) and insulin like growth factors (IGF) are well conserved proteins involved in the initial response to injur
... Show MoreThe adsorption process of 5-Fluorouracil (5FU) drugs on Aluminum nitride nanotubes surface (AlNNTs) have been evaluated through density functional theory (DFT). The DFT results show that the interaction of AlNNTs with the F atoms of 5FU drugs is strong due to the fact that the amount of adsorption energy was about − 29.65 kcal.mol−1. Conversely, the interaction of the 5FU through O atoms with the AlNNTs was weaker due to the lower value of adsorption energy. Also, based on the values of Gibbs free energy, the 5FU adsorption on the surfaces of AlNNTs was spontaneous. In addition, based on natural bond orbital (NBO) analysis, the direction of charge transfer was from fluorine’s σ orbitals of the drug to nitrogen’s and aluminum’s n*
... Show MoreBackground: Acute myeloid leukemia (AML) is a genetically heterogeneous leukemia characterized by abnormal myeloid blast accumulation, disrupting normal hematopoiesis and leading to rapid progression. Objective: To investigate SNPs within the 3’UTR of the CCAAT/enhancer-binding protein alpha (CEBPA) gene and its association with AML in Iraqi patients. Methods: The study was carried out on 120 AML patients classified into newly diagnosed, induction chemotherapy, and consolidation chemotherapy stages (40 each), and 40 individuals as a control group. Genomic DNA was extracted from AML patients and controls, followed by PCR amplification and Sanger sequencing of the 3’UTR region of the CEBPA gene. The AML patients were characterized
... Show MoreNew series of 4,4'-((2-(Aryl)-1H-benzo[d]imidazole1,3(2H)-diyl)bis(methylene))Diphenol(3a-g) was successfully synthesized from cyclization of the reduction product of bis Schiff bases (2) with aryl aldehydes bearing phenolic hydroxyl in the presence of acetic acid. The structure of these compounds was identified from FT-IR, 1H NMR, 13C NMR and EIMs. The Antioxidant capability was screened by DPPH and FRAP assays. Both assays showed antioxidant capability more than BHT as well. Compounds 3b and 3c showed antioxidant capacity slightly less than ascorbic acid. The docking study for theses compound was carried out as III DNA polymerase inhibitor. The results of docking demonstrated that the increase in hinderances around phenolic hy
... Show MoreNew series of 4, 4'-((2-(Aryl)-1H-benzo [d] imidazole-1, 3 (2H)-diyl) bis (methylene)) Diphenol (3a-g) was successfully synthesized from cyclization of the reduction product of bis Schiff bases (2) with aryl aldehydes bearing phenolic hydroxyl in the presence of acetic acid. The structure of these compounds was identified from FT-IR, 1H NMR, 13C NMR and EIMs. The Antioxidant capability was screened by DPPH and FRAP assays. Both assays showed antioxidant capability more than BHT as well. Compounds 3b and 3c showed antioxidant capacity slightly less than ascorbic acid. The docking study for theses compound was carried out as III DNA polymerase inhibitor. The results of docking demonstrated that the increase in hinderances around phenolic hydr
... Show MoreThe aim of this research is to assess the validity of Detailed Micro-Modeling (DMM) as a numerical model for masonry analysis. To achieve this aim, a set of load-displacement curves obtained based on both numerical simulation and experimental results of clay masonry prisms loaded by a vertical load. The finite element method was implemented in DMM for analysis of the experimental clay masonry prism. The finite element software ABAQUS with implicit solver was used to model and analyze the clay masonry prism subjected to a vertical load. The load-displacement relationship of numerical model was found in good agreement with those drawn from experimental results. Evidence shows that load-displacement curvefound from the finite element m
... Show MoreThis paper describes a research effort that aims of developing solar models for housing suitable for the Arabian region since the Arabian Peninsula is excelled with very high levels of solar radiation.
The current paper is focused on achieving energy efficiency through utilizing solar energy and conserving energy. This task can be accomplished by implementation the major elements related to energy efficiency in housing design , such as embark on an optimum photovoltaic system orientation to maximize seize solar energy and produce solar electricity. All the precautions were taken to minimizing the consumption of solar energy for providing the suitable air-condition to the inhibitor of the solar house in addition to use of energy effici
An analytical approach based on field data was used to determine the strength capacity of large diameter bored type piles. Also the deformations and settlements were evaluated for both vertical and lateral loadings. The analytical predictions are compared to field data obtained from a proto-type test pile used at Tharthar –Tigris canal Bridge. They were found to be with acceptable agreement of 12% deviation.
Following ASTM standards D1143M-07e1,2010, a test schedule of five loading cycles were proposed for vertical loads and series of cyclic loads to simulate horizontal loading .The load test results and analytical data of 1.95
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More