This investigation was carried out to estimate the antiparasitic potential of silver and Chitosan nanoparticles loaded with spiramycin against toxoplasmosis infected. After mice injected intraperitoneal in a dose 103viable tachyzoites for acute infection; then treated with spiramycin, chitosan nanoparticles and silver nanoparticles as a single or combined therapy given for seven days. Peritoneal fluid examination revealed a significant decrease in the number of
Schiff base obtained from the reaction (Trimethoprim) with (sodiumpyruvate ) to produce the ligand [NaL], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [NaL] was characterized by FT-IR, UV-Vis spectroscopy, 1H,13C-NMR spectra, mass spectra, and melting point.A new mixed ligand complexes have been prepared between ( 8- hydroxyquinolone) and the ligand [NaL] withMn(II).Co(II),Ni(II),Cu(II), (Zn(II) ,(Cd(II)and Pd(II). All the complexes were characterized by spectroscopic methods (FT-IR, UV-Vis spectroscopy), chloride content and melting point ,molar conductance and magnetic susceptibility.These measure- ments showed octahedral geometry around(,Mn2+, Co2+, Ni2+, Cu2+, Zn2+ and Cd2+) ions and square pla
... Show MoreIndia is today the largest democratic state in the Third World and has been able to maintain its national unity in the near future. The history of Indian civilization is more than 5,000 years old. It has achieved its heritage, culture, philosophy, traditions, national unity and unity and has taken its place among nations seeking progress and progress. Which are still visible to the present day, because of their history of civilization and achievements, and the fusion of cultures of invading peoples over the centuries with the culture of diverse Indian society, but despite being a secular state, Has put into place through its governments various forms of exclusion and marginalization towards the people of India, especially Muslims, and th
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAbstract
All central air conditioning systems contain piping system with various components, sizes, material, and layouts. If such systems in operating mode, the flow in piping system and its component such as valves can produce severe vibration due to some flow phenomenon’s. In this research, experimental measurements and numerical simulation are used to study the flow-induced vibration in valves. Computational fluid dynamics (CFD) concepts are included with one-way and two-way fluid-structure interaction concepts by using finite element software Package (ANSYS 14.57). Detection analysis is performed on flow characteristics under operation conditions and relations with structural vibration. Most of
... Show More
