Low conversion copolymerization of N-vinyl-2-pyrrolidon M.W = (111.14) VP (monomer-1) has been conducted with acrylic acid AA and methymethacrylate MMA in ethanol at 70ºC , using Benzoyl peroxide BPO as initiator . The copolymer composition has been determined by elemental analysis. The monomer reactivity ratios have been calculated by the Kelen-Tudos and Finman-Ross graphical procedures . The derived reactivity ratios (r1 , r2 ) are : (0.51 , 4.85) for (VP / AA ) systems and (0.34 , 7.58) for (VP , MMA) systems , and found the reactivity ratios of the monomer AA , MMA is mor than the monomer VP in the copolymerization of (VP / AA) and (VP /MMA) systems respectly . The reactivity ratios values were used for microstructures calculation.
The purpose of this work is to concurrently estimate the UVvisible spectra of binary combinations of piroxicam and mefenamic acid using the chemometric approach. To create the model, spectral data from 73 samples (with wavelengths between 200 and 400 nm) were employed. A two-layer artificial neural network model was created, with two neurons in the output layer and fourteen neurons in the hidden layer. The model was trained to simulate the concentrations and spectra of piroxicam and mefenamic acid. For piroxicam and mefenamic acid, respectively, the Levenberg-Marquardt algorithm with feed-forward back-propagation learning produced root mean square errors of prediction of 0.1679 μg/mL and 0.1154 μg/mL, with coefficients of determination of
... Show MoreVarious nutritional solutions given to patients contain amino acids. Possible interference of this supplementation with selected aminoglycoside antiboiotics, namely gentamycin and streptomycin was evaluated in vitro. In minimal medium, E.coli was inhibited by gentamycin and by streptomycin. Circumvention of this inhibition was obtained with a mixture of 20 amino acids in the medium. Deletion of amino acids revealved that circumvention. specific amino acids were required for such Deletion of the aromatic amino acids or cysteine abolished the protection against gentamycin and streptomycin, while the deletion of the branched chain amino acids abolished the protection against streptomycin only. Thereonine, on the other hand, appears to be essen
... Show MoreBackground: periodontitis is a chronic inflammatory disease causing destruction of the tooth supporting structures, initiated by dental plaque and modified by environmental and genetic risk factors. Cyclooxygenase-2 (COX-2) enzyme is responsible for the production of prostaglandin E2, an important mediator in the chronic periodontitis (CP) pathogenesis. Polymorphisms in COX-2 gene have linked to CP in different populations. Aim: To study the association between Cyclooxygenase-2 single nucleotide polymorphism rs689466 (-1195A/G SNP) and chronic periodontitis in a sample of Iraqi population. Methods: One hundred Iraqi subjects divided into two groups: case group consisted of 70 CP patient (35 males and 35 females) with age range 30-55 year
... Show MoreA simple, rapid and environmentally friendly dispersive liquid–liquid microextraction method-based spectrophotometric method for the trace determination of folic acid has been developed. The proposed method is based on the formation of a deep yellow product via reaction of folic acid and 1,2-naphthoquine-4-sulfonate at pH = 9. The formed complex was extracted using a mixture of chloroform and ethanol. Then, the tiny organic droplets were measured at λ = 520 nm. At the optimum conditions, linearity was ranged from 0.05 to 1.5 μg/mL for the standard and samples, with a linear correlation coefficient of 0.9996. The detection limits were 0.02, 0.027, 0.03, 0.02 and 0.04 μg/mL for standard, tablet (5 mg), tablet (1 mg), syrup and fl
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More
