In this study , the effect of an organic compound prepared as derivative of oxazepine tested on the activities of aspartate amino trasferase (AST) and alanin amino transferase (ALT). The kinetic study of such enzymes is in the presence of oxazepine derivative. The results revealed that the organic compound is a non competitive inhibitor for both enzymes. The Km value for AST is 1.3 × 10-3 M and Vmax for the uninhibited is 200 U/mL and for the inhibited is 111.1 U/mL while Km value for ALT is 2.5 × 10-3 M and Vmax are 89.66 U/mL and 56.77 U/mL for the uninhibited and inhibited enzyme respectively.
Compound 4-(((6-amino-7H-[1,2,4]triazolo[3,4-b][1,3,4]thiadiazin-3-yl)methoxy)methyl)- 2,6-dimethoxyphenol (6) was synthesized by multi steps. The corresponding acetonitrile thioalkyl (7) was cyclized by refluxing with acetic acid to afford 4-(((6-amino-7H-[1,2,4]triazolo[3,4- b][1,3,4]thiadiazin-3-yl)methoxy)methyl)-2,6-dimethoxyphenol (8). Two new series of 4-(((6-(3- (4-aryl)thioureido)-7H-[1,2,4]triazolo[3,4-b][1,3,4] thiadiazin-3-yl)methoxy)methyl)-2,6- dimethoxyphenol (9a-c) and of 4-(((6-(substitutedbenzamido)7H-[1,2,4]triazolo[3,4- b][1,3,4]thiadiazin-3-yl)methoxy)methyl)-2,6-dimethoxyphenol (10a-c) were synthesized as new derivatives for fused 1,2,4-trizaole-thiadiazine(8). The antioxidants of newly compounds were evaluated by DPPH
... Show MoreCompound 4-(((6-amino-7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (6) was synthesized by multi steps. The corresponding acetonitrile thioalkyl (7) was cyclized by refluxing with acetic acid to afford 4-(((6-amino-7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (8). Two new series of 4-(((6-(3-(4-aryl) thioureido)-7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (9a-c) and of 4-(((6-(substitutedbenzamido) 7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (10a-c) were synthesized as new derivatives for fused 1, 2, 4-trizaole-thiadiazine (8). The antioxidant
... Show MoreBeyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show MoreIn this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More