The research included the preparation and characterization of the new 4-ethyl-3-thiocimecarbazide ligand; N1-(dimethylcarbamoyl)-N2-ethylhydrazine-1, 2-bis (carbo-thiomide)(L). Three transition metal complexes were isolated from the mixing of the title ligand with the metal ions of (Ni (II), Co (II), and Cu (II)). The reaction was performed by mixing metal ligand in a 1: 1 mole ratio using EtOH as the medium. The chemical formula of L complexes is presented as follows;[LNiCl2H2O],[LCoCl2H2O] and [LCuCl2H2O], The entity of the expected structure of the ligand and its metal complexes were illustrated through a range of physicochemical techniques. These include; FT-IR, electronic spectra, 1H-and 13C-NMR spectra, elemental analysis (CHNS), chloride content, metal content, melting point, molar conductivity and magnetic susceptibility measurements. The spectral and analytical analyses concluded the isolation of …
Abstract: This study was aimed to investigate the effect of two doses of pregabalin (PGB) on hormonal level and sexual activity in female albino rats. Ninety female rats with age (9-10 weeks) and weight (200±20 g) were divided into three major groups of thirty rats. First group was considered as control G1, the second G2 and third G3 groups were exposed to PGB into two doses 150, and 300 mg/kg body weight per day respectively. Each major group was divided into three subgroups (subgroup A, B, and C of each has ten rats), the treatments last for one month for subgroup A, two months for subgroup B, and three months for subgroup C. Five rats from each subgroup were placed separately into two breeding cages with two isolated males and wait
... Show MoreGingival carcinoma is a malignant neoplasm affecting the oral mucosa and is associated with significant morbidity and mortality. Allium ampeloprasum var. porrum water extracts have gotten a lot of attention because of their bioactive components, such as polyphenols, flavonoids, and alkaloids, which have a variety of pharmacological activities, including antiproliferative actions. This study aimed to evaluate the histological and molecular effects of Allium ampeloprasum (leek) water extract on the proliferation of the murine gingival cancer cell line. Histological evaluation was conducted to examine morphological changes induced by extract treatment. Molecular mechanisms underlying the observed histological changes were investigated
... Show MoreThe Atoms in Molecules (AIM) analysis for triosmium cluster, which contains trihydridede, carbon, carbonyl and 2-methylbenzothiazolide ligands, [Os3(µ-H)3(µ3-ɳ2-CC7H3(2-CH3)NS)(CO)8] is reported. Bonding features in this cluster has been analyzed based on QTAIM ("Quantum Theory of Atoms in Molecules") in this work. The topological indices derived from electron density of relevant interactions in triosmium compound have been studied. The major interesting point of the AIM analyses is that the core of part (Os3H3) reveals the absence of any critical points and bond paths connecting any pairs of O
... Show MoreWe report the detail characterizations and
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreVerrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs a
This paper deals with constructing mixed probability distribution from mixing exponential
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the