A novel series of chitosan derivatives were synthesized via reaction of chitosan with carbonyl compounds and grafted it’s by with different amine compounds substituted hydrogen. The produced polymers were characterized by different analyses FTIR, 1HCNMR, XRD, DSC and TGA. Solubility in water as well as many solvent was investigated, antibacterial activity of chitosan and its derivatives against two types of bacteria E. coli and S. aureus was also investigated. The results showed that derivatives sort of have antibacterial activities against Esherichia coli (Gram negative) better than chitosan whilst compound IX has better antibacterial against Staphylococcus aureus (Gram positive). SEM analysis showed that increase of surface roughness with modification.
Two new simultaneous spectrophotometric methods for determination of Olanzapine and Ephedrine depend on third (D3) and fourth (D4) derivative of zero spectrum of two drugs were developed. The peak – to- base line, peak to peak and area under peak were found proportional with concentration of the drugs up to (4-24 µg/ml-1) at known experimental wavelengths. The results showed that the method was precise and accurate through RSD% (0.5026-4.0273),( 0.2399 6.9888) and R.E %(-2.3889-0.8333) ,) -2.9444-0.2273) while the LOD (0.0057- 0.8510 μg.ml-1), ( 0.0953-0.9844 μg.ml-1) and LOQ (0.0173- 2.5788μg.ml-1),( 0.5774-2.9829 μg.ml-1) were found for the two drugs respectively. The methods were applied i
... Show MoreThe a i m of the present study is to shed some light on the
imm u nol ogica l effect of so lub l e protei ns extracted from Proteu mirabilis th rough em ployi ng t he level of the en zy mati c activity of Superoxide Dismutase,SOD.
The olublc proteins·Sp I and Sp2,were extracted by usi ng th e lysosyme enzyme .The rabbits were divided into three groups ,the fir t one was injected w
... Show MoreNanocomposites of polymer material based on CdS as filler
material and poly methyl methacrylate (PMMA) as host matrix have
been fabricated by chemical spray pyrolysis method on glass
substrate. CdS particles synthesized by co-precipitation route using
cadimium chloride and thioacetamide as starting materials and
ammonium hydroxide as precipitating agent. The structure is
examined by X-ray diffraction (XRD), the resultant film has
amorphous structure. The optical energy gap is found to be (4.5,
4.06) eV before and after CdS addition, respectively. Electrical
activation energy for CdS/PMMA has two regions with values of
0.079 and 0.433 eV.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More