Therapeutically and prophylactically using Microspheres containing doxycycline isolated from shell of shrimp. Low molecule weight poly lactic acid was prepared. In this study, Poly lactic acid (PLA)/ poly vinyl alcohol (PVA)/poly ethyleneglycol(PEG) loading doxycycline blend solutions was prepared. Also Poly lactic acid (PLA)-Tannin blend via solvent evaporation method was prepared. Microspheres of chitosan/gelatin microsphere loading doxycycline was prepared by emulsion crosslinking technique. Both microsphere and blends were characterized by Fourier transform infrared (FTIR) spectrophotometer. The FTIR spectra were shown distinguish bands. The in vitro release of doxcycline from its matrix at pH 7 was studied. The prophylactic
... Show MoreNew vision of Mr. Abdul Mahdi Al-Muttafiqi in the light of unpublished documents
الهدف من الدراسه تحضير فئه جديده من بوليمرات السليكون P1-P4 والتي تمت على اساس استحدام ثنائي مثيل ثنائي كلورو سيلان((DCDMS مع بعض المركبات العضويه التي تحتوي مجاميع الهيدروكسيل الطرفيه والتي حضرت لاول مره M1-M4، بأستخدم البلمره التكثيفيه .كما تم تحضير متراكباتها النانويهP′1-P′4 بوجود جسيمات الفضه النانويه (Ag-NPs) باستخدام طريقة صب المحاليل. شخصت جميع التراكيب للمونمرات والبوليمرات المحضره باستخدام مطيافية
... Show MoreThe present study introduces description of new species of leafhopper Cicadella latreilla nov. External morphological characters particularly female genitalia were discussed and illustrated, shape of male abdominal apodeme, chaetotaxy of genital style and genital plate of male genitalia, shape of Aedeagus and connective . The external morphological characters were: spotting patterns of vertex, face, pronotum of prothorax, and metothorax, and of lower and upper valves of ovipositors,shape of female seventh abdominasternum.
Complexes of some metal ions ( Mn(I? ) , Co(??) , Ni(??) ,Cu (??) , Zn(I?) , Cd (??) , and Hg(??) ) with 8-hydroxyquinoline (Oxine) and 2- Picoline (2-pic ) have been synthesized and characterized on the basis of their FT-IR. and Uv-visible spectroscopy ,atomic absorption molar conductivity measurements and magnetic susceptibility ,from the results obtained the following general formula has been given for prepared complexes [M (oxine)2 (2-pic)2]where M = M(??) = Mn , Co , Ni , Cu , Zn , Cd , Hg(oxine)- = ionic ligand 8-hydroxyquinolin (oxinato)(2- pic) = 2- picoline
A study were conducted to examinate the effect of organic and aqueous (Hot, Cold) Extracts from leaves of Duranta repens on the growth and activities of the following types of Bacteria:- Staphylococcus aureus,Streptococcus pyogens ,Escherichia coli,Klebsilla pneumonia, in addition to the yeast Candida albicans and the fungi Aspergullis niger ,Aspergulls flavus.The result showed that gram Positive Bacteria is more sensitive to the extracts than gram negative bacteria with Minimum inhibitory concentration (MIC) value (50,25,50,100)% and Minimum Bactericidal Concentration (MBC) value (100,50,200,100)% for all types Bacteria respectively . The most active extract against A.niger ,A,flavus was cold and hot aqueous extract from the leaves with d
... Show MoreSince the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show More