Coumarin derivatives have shown different biological activities, such as antifungal, antibacterial antiinflammatory, and antioxidant activities, besides antibiotic resistance modulating effects, and anti-HIV, hepatoprotective, and antitumor effect. So, new coumarin derivatives (hydrazones and an amide) were synthesized through multisteps reactions. All the synthesized target compounds were characterized by FT-IR spectroscopy, 1HNMR analysis. The compounds then evaluated for their anti-bacterial activity by means of well-diffusion method against two gram-positive bacteria (Staphylococcus aureus, Streptococcus pneumoniae) and two gram-negative bacteria (E.coli and Pseudomonas aeruginosa). The highest activity was demonstr
... Show MoreThis study aimed to determine the measurements and classification of Schneider membrane thickness correlated to age and sex factors using cone beam computed tomography (CBCT). Methods: The study included CBCT images for 100 maxillary sinuses of 50 consecutive patients, and the thickness of the maxillary sinus membrane (Schneiderian membrane) was measured in coronal view from the lowest point in the floor of the maxillary sinus to the highest point. The thickness of the Schneiderian membrane was classified into 4 types. Results: The study result revealed that out of the total cases, 45% of sinus membranes were classified as type 2, while only 10% were classified as type 4. The most frequent type of membrane thickness diagnosed in the age gro
... Show MoreThe objective of the study was to develop microneedle (MN) patch, with suitable properties to ensure the delivery of a therapeutic level of lornoxicam (LXM) in a period suitable to replace parenteral administration in patients, especially those who fear needles. The used polymers were cold water-soluble polyvinyl alcohol (PVA) and polyvinylpyrrolidone (PVP) of low molecular weight with PEG 400 as plasticizer and Tween 80 (to enhance the release) using micro molding technique. Patches were studied for needle morphology, drug content, axial fracture force measurement and drug release while the optimized formulas were further subjected to pH measurement, folding endurance, ex vivo permeation study, histopathology study, stability study and
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreABSTRACT Background: One of the major problems of all ceramic restorations is their probable fracture against the occlusal forces. The objective of this in vitro study was to evaluate the effect of two gingival finishing lines (90°shoulder and deep chamfer) on the fracture resistance of full contour CAD/CAM and heat press all-ceramic crowns. Materials and Methods: Thirty two maxillary first premolars were prepared to receive full contour CAD/CAM (zolid) and heat press (Cergo Kiss) ceramic crowns using a special paralleling device (Parallel-A-Prep). The teeth were divided into four groups according to the type of finishing line prepared. Each crown was cemented to its corresponding tooth using self-etch, self-adhesive dual cure resin ceme
... Show MoreA frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm co
... Show MoreImage recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third
... Show MoreAdvances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreThe feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec