Objective: Synthesized a series of new thiourea (TU) derivatives, tested their antioxidant activity, and investigated their expected biological activity by theoretical study (computational methods). Methods: The derivatives were made using a one-pot reaction with two steps. Initially, succinyl chloride was mixed with KSCN to make succinyl isothiocyanate. Then, primary and secondary amines were used to make TU derivatives. The theoretical studies were done by Swiss ADME and molecular docking via Genetic Optimization of Linkage Docking (GOLD). Then evaluate antioxidant activity using the DPPH scavenging method. Results: FT-IR, 1H NMR, and 13C NMR spectroscopy show the verification of all the prepared derivatives. Compounds (II), (VIII),
... Show MoreBackground: The Andrews’ six keys of normal occlusion contribute individually and collectively to the total scheme of occlusion and, therefore, are viewed as essential to successful orthodontic treatment. The present research aims to evaluate the presence of the parameters of the Andrews’ Six Keys of normal occlusion in a sample of 100 Iraqi adults with complete permanent dentition and clinically acceptable normal occlusion (Angle’s Class I) in Baghdad city. Their age range 18-25 years (60 males and 40 females). Materials and methods: Each patient was subjected to clinical examination and then study cast models were made, with their occlusal records. The measuring tools that have been used involved: Three-dimensional goniometer to me
... Show MoreCrop diseases are usually caused by inoculum of pathogens which might exist on alternate hosts or weeds as endophytes. These endophytes, cum pathogens, usually confer some beneficial attributes to these weeds or alternate hosts from protection against herbivores, disease resistance, stress tolerance to secondary metabolites production. This study was therefore carried out to isolate potential crop pathogens which exist as endophytes on weed species in the University of Ilorin plantations. Green asymptomatic leaves were collected from 10 weed species across the plantations, and processed for their endophytic fungi isolation. Isolates were purified into pure cultures and used for molecular identification using the internal transcribed spac
... Show MoreThe prostheses sockets use normally composite materials which means that their applications may be related with the human body. Therefore, it was very necessary to improve the mechanical properties of these materials. The prosthetic sockets are subjected to varying stresses in gait cycle scenario which may cause a fatigue damage. Therefore, it is necessary or this work to modify the fatigue behavior of the materials used for manufacturing the prostheses sockets. In this work, different Nano particle materials are used to modify the mechanical properties of the composite materials, and increase the fatigue strength. By using an experimental technique, the effect of using different volu
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show More