One-hundred and twenty Iraqi women (60 single women and 60 married women) with age ranges from (17-49) years have been involved in this study to estimate the levels of anti-mullerian hormone (AMH) and follicle stimulating hormone (FSH) as markers of ovarian aging. The descriptive data [age, body mass index (BMI), age at menarche, duration of menarche] have been recorded. Blood samples were collected from the studied women to determine the levels of AMH and FSH. The results revealed non-significant (p>0.05) differences in levels of AMH and FSH between single women and married women. A significant negative correlation was observed between AMH levels and age in single women (r=-0.519, p<0.05) and married women (r=-0.433, p<0.05). A no
... Show MoreA group of amino derivatives [4-aminobenzenesulfonamide,4-amino-N¹ methylbenzenesulfonamide, or N¹-(4-aminophenylsulfonyl)acetamide] bound to carboxyl group of mefenamic acid a well known nonsteroidal anti-inflammatory drugs (NSAIDs) were designed and synthesized for evaluation as a potential anti-inflammatory agent. In vivo acute anti-inflammatory activity of the final compounds (9, 10 and 11) was evaluated in rat using egg-white induced edema model of inflammation in a dose equivalent to (7.5mg/Kg) of mefenamic acid. All tested compounds produced a significant reduction in paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, the 4-amino-N-methylbenzenesulfonamide derivative (c
... Show MoreIn this research a computational simulation has been carried out on the design and properties of the electrostatic mirror and a mathematical expression has been suggested to represent the axial potential of an electrostatic mirror. The electron beam path using the Bimurzaev technique had been investigated as mirror trajectory with the aid of Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements. The Electrode shape of mirror two electrodes has been determined by using package SIMION computer program. Computations have shown that the suggested potentials giv
... Show MoreCoupling reaction of m-and p- amino acetop henone and p-amino benzoic acid with (LHistidine) gave the new bidentate azo ligands (L1, L2 and L3). The prepared ligands were identified by FT-IR, UV-Vis, 1HNMR and GC- mass sp ectroscopic technique. Treatment of the prepared ligands with the following metal ions (CoII, NiII, CuII, ZnII, CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M (L)2 Cl2]. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis and 1HNMR spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the com
... Show MoreCoupling reaction of m-and p- amino acetophenone and p-amino benzoic acid with (L- Histidine) gave the new bidentate azo ligands (L1, L2 and L3). The prepared ligands were identified by FT-IR, UV-Vis, 1HNMR and GC- mass spectroscopic technique. Treatment of the prepared ligands with the following metal ions (CoII, NiII, CuII, ZnII, CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2 Cl2]. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis and 1HNMR spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the c
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More