Preferred Language
Articles
/
XRcqjJIBVTCNdQwCnLXN
Synthesis, Characterization, Molecular Docking, ADMET Study, and Antimicrobial Evaluation of New Mannich Bases of Isatin–Thiazole Imine Bases
...Show More Authors

Background: The isatin molecule is present in many natural substances, including plants and animals, and is used to prepare compounds with various biological activities. Objectives: To synthesize a new series of isatin derivatives with the expectation that they will have antimicrobial activity. Methods: Thiazole Schiff bases were synthesized from various Mannich bases of isatin to evaluate their antimicrobial properties. Initially, Mannich bases (2a–e) were synthesized by reacting isatin with formaldehyde and different secondary amines. Subsequently, they were treated with 2-aminothiazole to yield the final compounds (3a–e). Spectroscopic characterization was done via FT-IR and 1H-NMR. The antimicrobial screening was conducted on all derivatives. Molecular docking and ADMET analysis were performed on the final compounds, comparing them with standard drugs (ciprofloxacin and fluconazole). Results: The antimicrobial activity was assessed on two Gram-positive bacteria, Staphylococcus aureus and Bacillus licheniformis; two Gram-negative bacteria, Escherichia coli and Acinetobacter baumannii; and one fungus species, Candida albicans. Molecular docking has recorded higher docking scores for 3d and 3e compared to ciprofloxacin and fluconazole. The virtually active molecules showed an adequate drug-like profile and desired pharmacokinetic properties in the ADMET analysis. Conclusions: Most derivatives displayed significant antimicrobial activity, with compound 3e being the most active, followed by compound 3b. Molecular docking revealed higher scores for compound 3e compared to fluconazole and for compounds 3d and 3e compared to ciprofloxacin. ADMET analysis of compound 3e showed excellent absorption, consistent with its strong GIT absorption.

Scopus Crossref
View Publication
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
Postprandial Hyperglycemia as a Significant Risk Factor for Coronary Heart Disease
...Show More Authors

Background: The highest concentrations of
blood glucose during the day are usually found
postprandialy. Postprandial hyperglycemia (PPH)
is likely to promote or aggravate fasting
hyperglycemia. Evidence in recent years suggests
that PPH may play an important role in functional
& structural disturbances in different body organs
particularly the cardiovascular system.
Objective: To evaluate the effect of (PPH) as a
risk factor for coronary Heart disease in Type 2
diabetic patients.
Methods: Sixty-three type2 diabetic patients
were included in this study. All have controlled
fasting blood glucose, with HbA1c correlation.
They were all followed for five months period
(from May to October 2008)

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Contemporary Mathematical Sciences
Pre-Topology Generated by the Short Path Problems
...Show More Authors

Let G be a graph, each edge e of which is given a weight w(e). The shortest path problem is a path of minimum weight connecting two specified vertices a and b, and from it we have a pre-topology. Furthermore, we study the restriction and separators in pre-topology generated by the shortest path problems. Finally, we study the rate of liaison in pre-topology between two subgraphs. It is formally shown that the new distance measure is a metric

Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
Automatic voice activity detection using fuzzy-neuro classifier
...Show More Authors

Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto

... Show More
View Publication Preview PDF
Scopus (4)
Scopus
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
The Ranking Function for Solving the Fuzzy Hotelling T2 Test
...Show More Authors

     A multivariate control chart is measured by many variables that are correlated in production, using the quality characteristics in any product. In this paper, statistical procedures were employed to find the multivariate quality control chart by utilizing fuzzy Hotelling  test. The procedure utilizes the triangular membership function to treat the real data, which were collected from Baghdad Soft Drinks Company in Iraq. The quality of production was evaluated by using a new method of the ranking function.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
The Broken Wings: The character of the Arab Christian |Woman in Sami Michael's Novel "Trumpet in the Wadi" versus "Jasmine" by Eli Amir: הכנפיים שנשברו דמות האישה הערבית הנוצרית ברומן " חוצוצרה בוואדי " של סמי מיכאל לעומת דמותה ב " יסמין " של אלי עמיר
...Show More Authors

Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 20 2021
Journal Name
Materials Science Forum
Red Laser Irradiation Effect on the Structural Properties of MawsoniteCu<sub>6</sub>Fe<sub>2</sub>SnS<sub>8</sub> [CFTS] Thin Films Deposited via Semi-Computerized Spray Pyrolysis Technique
...Show More Authors

The existing investigation explains the consequence of irradiation of violet laser on the structure properties of MawsoniteCu6Fe2SnS8 [CFTS] thin films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser. when the received films were processed by continuous red laser (700 nm) with power (>1000mW) for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time (0,30,45,60,75,90 min) respectively at room temperature.. The XRD diffraction gave polycrysta

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fixed Point for Asymptotically Non-Expansive Mappings in 2-Banach Space
...Show More Authors

  In  this  paper, we  introduced   some  fact  in   2-Banach  space. Also, we define  asymptotically  non-expansive  mappings  in  the  setting  of  2-normed  spaces analogous  to  asymptotically non-expansive mappings  in  usual  normed spaces. And then prove the existence of fixed points for this type of mappings in 2-Banach spaces.

View Publication Preview PDF
Publication Date
Sun Jan 03 2010
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Cytokine Profile in Patients with Rheumatoid Arthritis
...Show More Authors

Background: Cytokines produced by inflammatory cells play a pivotal role in synovial inflammation and joint destruction in rheumatoid arthritis.
Patients and Methods: The cytokine serum levels were measured by EASIA (Enzyme amplified sensitivity immunoassay) in sera from 50 RA patients, and 40 healthy donors. Cytokine levels were compared in different RA subpopulations (positive or negative rheumatoid factor (RF), long term or recent onset disease, high or low disease activity). In addition, the possible association with other demographic and clinical parameters (gender, age, etc) was also analyzed.
Results: It was demonstrated that IL-2, IL-6 and IFN-δ levels were elevated in serum samples of RA pati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Smartphone -Based Model for Human Activity Recognition
...Show More Authors

Activity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Hide Secret Messages in Raster Images for Transmission to Satellites using a 2-D Wavelet Packet
...Show More Authors

     The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre

... Show More
View Publication Preview PDF