Our goal in this research, some new nucleoside analogues was synthesized. Starting from ?-D glucose which was converted to per acetylated ?-D gluco pyronoside then converted to active from(1-Bromo Sugar (2) as a sugar moiety.The base moiety 2-substituted benzimidazole was prepared from condensation of phenylene diamine with different aromatic aldehydes, which were subjected to amino alkylation via Mannich reaction forming new nucleobase derivatives. Condensation of nucleobase with bromo sugar through nucleophilic substitution of anomeric carbon with nitrogen forming new protected nucleoside analogues then hydrolyzed with sodium methoxide in methanol to obtain our target, the free nucleoside analogues. All prepared compound were identified b
... Show MoreThirty five samples were collected from patients (1-30) years old, suffered from, infected skin , rushes, boils , oral thrush, anal & vaginal itches. Candida albicans 57.3% (20 isolates) and Candida tropicalis 22.5% (8 isolates) Aspergillus fumegatus 11.5% (4 isolates) Aspergillus nigar 8.7%(3 isolates) , were isolated & identified from these samples. Alcoholic & water hot extracts of the punica granatum (Pomegranate) peels as well as the dried powder were prepared. The anti-fungal activity of the extracts was evaluated by means of the agar-well diffusion assay. The extract exhibited potent activity against yeast. The Minimum inhibitory concentra
... Show MoreThis investigation was designed to determine the occurrence of intestinal parasites in fresh
vegetables(Apium graveolense, Lepidium aucheri and Allium porrum), from different markets
as a primary effort in Iraq. Eight genera and species of intestinal parasites appear in
vegetables, they were as follow: Echinococcus sp. 50%,Oxyuris equi 45%,Habronema sp.
45%,Parascaris equroum 31.6%,Strongyloides westrei 30%,Toxocara sp. 18.3%,Ascaris
lumbricoides 11.6% and Hymenolepis sp. 8.3% .The scarcity of fresh water has meant that
urban gardeners are increasingly irrigating their plots with wastewater. This poses a threat to
public health in addition of roaming dogs in open farms. All studied areas showed high rates
of eggs
Thin a-:H films were grown successfully by fabrication of designated ingot followed by evaporation onto glass slides. A range of growth conditions, Ge contents, dopant concentration (Al and As), and substrate temperature, were employed. Stoichiometry of the thin films composition was confirmed using standard surface techniques. The structure of all films was amorphous. Film composition and deposition parameters were investigated for their bearing on film electrical and optical properties. More than one transport mechanism is indicated. It was observed that increasing substrate temperature, Ge contents, and dopant concentration lead to a decrease in the optical energy gap of those films. The role of the deposition conditions on value
... Show MoreThis study explores the challenges in Artificial Intelligence (AI) systems in generating image captions, a task that requires effective integration of computer vision and natural language processing techniques. A comparative analysis between traditional approaches such as retrieval- based methods and linguistic templates) and modern approaches based on deep learning such as encoder-decoder models, attention mechanisms, and transformers). Theoretical results show that modern models perform better for the accuracy and the ability to generate more complex descriptions, while traditional methods outperform speed and simplicity. The paper proposes a hybrid framework that combines the advantages of both approaches, where conventional methods prod
... Show MoreGingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft
... Show MoreMicro metal forming has an application potential in different industrial fields. Flexible tool-assisted sheet metal forming at micro scale is among the forming techniques that have increasingly attracted wide attention of researchers. This forming process is a suitable technique for producing micro components because of its inexpensive process, high quality products and relatively high production rate. This study presents a novel micro deep drawing technique through using floating ring as an assistant die with flexible pad as a main die. The floating ring designed with specified geometry is located between the process workpiece and the rubber pad. The function of the floating ring in this work is to produce SS304 micro cups with profile
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More