By condensation of benzaldehyde with thiourea in absolute ethanol in the presence of glacial acetic acid as a catalyst, the Schiff base(1-benzylidenethiourea)[I] was synthesized by synthesis of 4-(3-benzylidenethioureido)-4-thioxobut-2-enoic acid compound[II] by reaction of maleic anhydride with schiff base [I] in DMF. When treating compound [II] with ammonium persulfate (NH4)2S2O8 (APS) as an ethanol initiator to obtain polymer [III], compound [III] reacted to polymer [IV] with SOCl2 in benzene. Sulfamethizole, celecoxib, salbutamol, 4-aminoantipyrine to yield polymers [V-VIII], compound [IV] reaction with different drugs. Spectral evidence established the structure of synthesized compounds: FTIR and 1HNMR, UV-Vis Spectroscopy and Elemental Analysis (C.H.N-S). These synthesized derivatives [V-VIII] were tested for their antibacterial activity against Bacillus subtilis (G+) and Escherichia coli (G-) by agar well diffusion process, and the results showed that all polymers had a greater diameter of the growth inhibition region. This may be relative to the presence of sulfamethizole medication, maleimide group and Schiff bases, Polymer[V] demonstrated excellent inhibition against Bacillus subtilisa and E.coli.
Bacterial strains were isolated from oil-contaminated soil, in 2018, these isolates were identified, and with the aim of finding out the ability of these isolates to degrede the oil compounds, the color change of medium which added to it isolates was read by the method of Pacto Bushnell Hans. Then the change in the petroleum compounds was read by gas chromatography, for the most effective isolates.
The nine isolated bacterial showed different degrees of color change, and the isolates (Pseudomonas, Bacillus, Micrococcus) outperformed the color change amount (78, 78, 77) %, respectively, compared to the control, and the three isolates together showed the best color change of 90.7. % Compared to the control, and the
... Show MoreThis paper is interested in certain subclasses of univalent and bi-univalent functions concerning to shell- like curves connected with k-Fibonacci numbers involving modified Sigmoid activation function θ(t)=2/(1+e^(-t) ) ,t ≥0 in unit disk |z|<1 . For estimating of the initial coefficients |c_2 | , |c_3 |, Fekete-Szego ̈ inequality and the second Hankel determinant have been investigated for the functions in our classes.
Nowadays nanoparticles have widespread application in various industriesbecause of their special and unique features, there are many studies in sideeffects of nanomaterial. This study done by 40 white female mice withevery other day intraperitoneally injection of low and high doses of both ofZnO kg of body weight) and FeOnanoparticles (5 and 40 mg/kg). After a 15 days period, the mice weresacrificed and blood samples were collected for hormone analysis, andtissue samples for morphometric studies.Statistical Analysis shows significant differences in LH, Estrogen,Progesterone hormone levels between groups, while there are insignificantdifferences in Follicle stimulating hormone (FSH) level between thegroups compared with its level in
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThis paper deals with constructing mixed probability distribution from mixing exponential
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Since the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show More* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2
This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.
Finally, all algori
... Show More