Objective: Synthesized a series of new thiourea (TU) derivatives, tested their antioxidant activity, and investigated their expected biological activity by theoretical study (computational methods). Methods: The derivatives were made using a one-pot reaction with two steps. Initially, succinyl chloride was mixed with KSCN to make succinyl isothiocyanate. Then, primary and secondary amines were used to make TU derivatives. The theoretical studies were done by Swiss ADME and molecular docking via Genetic Optimization of Linkage Docking (GOLD). Then evaluate antioxidant activity using the DPPH scavenging method. Results: FT-IR, 1H NMR, and 13C NMR spectroscopy show the verification of all the prepared derivatives. Compounds (II), (VIII),
... Show MoreMethicillin resistant Staphylococcus aureus (MRSA) is one of the principal nosocomial causative agents. This bacterium has the capability to resist wide range of antibiotics and it is responsible for many diseases like skin, nose and wounds infection. In this study, randomly amplified polymorphic DNA (RAPD)-PCR was applied with ten random primers to examine the molecular diversity among methicillin resistant Staphylococcus aureus (MRSA) isolates in the hospitals and to investigate the genetic distance between them. 90 Isolates were collected from clinical specimens from Iraqi hospitals for a total of 90 isolates. Only 10 strains (11.11%) were found to be MRSA. From these 10 primers, only 9 gave clear amplification products. 91 fragment l
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreBacterial infections pose an ongoing challenge due to resistance developed by infectious bacteria. So much research targeting designing new antibacterials is published annually. Our goal is to synthesize compounds that have given antibacterial activity according to molecular docking against the chosen target protein and that have acceptable ADMET properties that can be synthesized and used in the future. New 2-(5-methoxy-1-(4-chlorobenzene)-2-methyl-1H-indol-3-yl)acetohydrazide derivatives’ antibacterial efficacy against two common strains of Gram-negative and Gram-positive microorganisms has been developed, produced, and investigated. Sophisticated, modern analytical methods, including ATR-FTIR and 1H NMR spectroscopy, were used
... Show MoreIn humans, Pseudomonas aeruginosa is the second most frequent gram negative nosocomial pathogen in hospitals and has the highest case-fatality rate of all hospital-acquired bacteremia because of the hardy resistance of these bacteria to mechanical cleansing as well as to disinfectant, and many antibiotics. The susceptibility of bacteria against the antibiotics is modulated by several local factors such as temperature which modified drug efficacy, so this study was carried out to evaluate the effect of different temperature (20,42,45)Ċon the susceptibility of Pseudomonas aeruginosa to the minimum inhibitory concentrations (MIC) of the antimicrobial agents before and after irradiation. The samples collected from 150 persons suffering from
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreBackground: Implant stability is considered one of the most important factors affecting healing and successful osseointegration of dental implants. The aims of the study were to measure the implant stability quotient (ISQ) values during the healing period and to determine the factors that affect implant stability. Materials and methods: Thirty patients enrolled in the study (17 female, 13 male). They received 44 Implantium® Dental Implants located as the following: 22 implants in maxillary jaw, 22 implants in mandibular jaw from them 17 implants in anterior segment and 27 in posterior segment. The bone density determined using interactive CT scan and classified according to the Misch bone density classification (29 implants in (D3), 15 i
... Show More200 samples collected Adrar of patients with urinary tract infection were investigating the types of bacteria most local isolates showed high resistance to antibiotics penicillin c ??????? Amoxicillin Beracelin