Schiff bases, named after Hugo Schiff, are aldehyde- or ketone-like compounds in which the carbonyl group is replaced by imine or azomethine group. They are widely used for industrial purposes and also have a broad range of applications as antioxidants. An overview of antioxidant applications of Schiff bases and their complexes is discussed in this review. A brief history of the synthesis and reactivity of Schiff bases and their complexes is presented. Factors of antioxidants are illustrated and discussed. Copyright © 2016 John Wiley & Sons, Ltd.
Background: obesity is nowadays a pandemic condition. Obese subjects are commonly characterized by musculoskeletal disorders and particularly by non-specific low back pain (LBP). However, the relationship between obesity and LBP remain to date unsupported by an objective measurement of the mechanical behavior of spine and it is morphology in obese subjects. . Objectives: To identify the relationship between obesity and LBP regarding (height, weight, sleeping, chronic diseases, smoking, and steroid). Method: A cross-sectional study was conducted from the first of January 2016 to January 2018 in obe
... Show MoreThe study showed that there are (28) plant families present in Al-Razzaza Lake. The families are (Amaranthaceae, Amaryllidaceae, Aizoaceae, Apiaceae, Apocynaceae, Asteraceae, Brassicaceae, Boraginaceae, Capparaceae, Caryophyllaceae, Cistaceae, Colchicaceae, Convolvulaceae, Cynomoriaceae, Fabaceae, Frankeniaceae, Lamiaceae, Liliaceae, Malvaceae, Orobanchaceae, Plantaginaceae, Poaceae, Polygonaceae, Ranunculaceae, Solanaceae, Tamaricaceae,Typhaceae, Zygophyllaceae). Asteraceae family is the largest number of species found in abundance in this lake, followed by the Fabaceae family.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis study explores the challenges in Artificial Intelligence (AI) systems in generating image captions, a task that requires effective integration of computer vision and natural language processing techniques. A comparative analysis between traditional approaches such as retrieval- based methods and linguistic templates) and modern approaches based on deep learning such as encoder-decoder models, attention mechanisms, and transformers). Theoretical results show that modern models perform better for the accuracy and the ability to generate more complex descriptions, while traditional methods outperform speed and simplicity. The paper proposes a hybrid framework that combines the advantages of both approaches, where conventional methods prod
... Show MoreThis study was performd on 50 urine specimens of patients with type 2 diabetes, in addition, 50 normal specimens were investigated as control group. The activity rate of maltase in patients (6.40±2.17) I.U/ml and activity rate of maltase in normal (0.44±0.20)I.U/ml. The results of the study reveal that maltase activity of type 2 diabetes patient's urine shows significant increase (P<0.01) compare to normal.
Abstract:-
The title of the thesis (TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT) is related to the first legislative source of Islam, the Qur’an, and highlights the positive effects while adhering to the teachings of Islamic Sharia in terms of its importance in building the individual and thus society.
In this study, the researcher follows the objective approach, which includes collecting verses that refer to the issue of piety, trust and intention, and studying the verses objectively according to the sources, language books, ethics, and so on.
I sought to give each topic important headings, then study the topic and clarify it in general, based on narrations an
... Show MoreTo learn how the manner of preparation influences film development, this study examined film expansion under a variety of deposition settings. To learn about the membrane’s properties and to ascertain the optimal pretreatment conditions, which are represented by ambient temperature and pressure, Laser pressure of 2.5[Formula: see text]m bar, the laser energy density of 500[Formula: see text]mJ, distortion ratio ([Formula: see text]) as a function of laser pulse count, all achieved with the double-frequency Nd: YAG laser operating in quality-factor mode at 1064[Formula: see text]nm. MgxZn[Formula: see text] films of thickness [Formula: see text][Formula: see text]nm were deposited on glass substrates at pulse
... Show More