Gelatin a promising biomaterial which is useful and interesting natural polymer which offer possibilities of chemical modification through grafted copolymerization with an saturated acid anhydride such as methyl nadic anhydride formatted gelatin –g- methyl nadic anhydride copolymer (A1), then modified to its corresponding polymer (A2) by substituted salbutamol as useful derivative as biomaterial .the prepared drug biopolymer was characterization by FTIR spectroscopy and thermal analysis was studied controlled drug release was measured in different buffer solution at 37C0 .
In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show MoreAbstract The present study aimed to investigate the morphological description and histological structure of thyroid gland in Herpestes javanicus . The results revealed that thyroid gland in adult Herpestes javanicus is located in the neck region just below the larynx and attached to the trachea . Histological study revealed that thyroid gland in H. javanicus surrounded by a capsule of losse connective tissue and the thyroid gland mainly formed from follicles within different sizes. The results showed that the follicle consists of three compenets represented by follicular lining cells, basal parafollicular cells and the colloid. Microscopical examination revealed that the follicular lining tissue is either to be simple squamous or simple cub
... Show MoreIn this study the new azo compounds (3compounds) for nitrogen bases (Adenine and Cytosine) are synthesized through two reaction steps (formation of diazonium salt and coupling reaction). The compounds have been characterized by FTIR, melting point, and ultra-violate (UV) spectra. All synthesized compounds have been estimated in vitro for their antimicrobial activities against two species of bacteria(E.coli, S.aureus)and one kind of fungi ( Aspergillus flavus) .The results show that these compounds have very good antibacterial and antifungal activities especially compounds 1 and 3.To study the effect of these compounds were making some physiological tests on rats are made ,the results of hematological study showed decreasing level of
... Show MoreThe adsorption behavior of congo red dye from its aqueous solutions was investigated onto natural and modified bauxite clays. Both bauxite and modified bauxite are primarily characterized by using, FTIR, SEM, AFM, and XRD. Several variables are studied as a function of adsorption including contact time, adsorbent weight, pH, ionic strength, particle size and temperature under batch adsorption technique. The absorbance of the solution before and after adsorption was measured spectrophotometrically. The equilibrium data fit with Langmuir model of adsorption and the linear regression coefficient R2 is found to be 0.9832 and 0.9630 for natural and modified bauxite respectively at 37.5°C which elucidate the best fitting isotherm model. The gene
... Show MoreBreast cancer is the second most common cancer in women world. Multiple Cytokines appear to have a dominant role in human breast cancer formation. Estimation of the in situ expression of IL-6 and IL-1β in breast cancer patients. A sixty patients with breast cancer BC were divided into two clinical subgroups, (30) with malignant breast cancer MBC and (30) with benign breast tumor as a control group according to histological examination. In situ hybridization technique used for detection of IL-6 and IL-1β mRNA sequence in two groups. The results showed that percentages of mRNA expression of IL-6 and IL-1β were in (≥ 11-50%) for malignant breast cancer. This research also investigated that (73.3%) of beni
... Show MoreYoung people represent the power and cornerstone of societies and their superiority is linked to their well-being. Their empowerment is as essential as the heart to the body, if it is corrupt, then the whole body is corrupt, and vice versa. The exposure to extremism and pressure from their families leads to violent acts and crimes for obtaining money through unknown organized bodies. This will drive them to fail in their life in an attempt to fulfill their most basic needs, which they have been deprived of by their families, the government, and other institutions. Therefore, governments should provide job opportunities for young people and provide entertainment centers, sports clubs, and family education centers that raise awareness of s
... Show MoreThe high cost of chemical analysis of water has necessitated various researches into finding alternative method of determining portable water quality. This paper is aimed at modelling the turbidity value as a water quality parameter. Mathematical models for turbidity removal were developed based on the relationships between water turbidity and other water criteria. Results showed that the turbidity of water is the cumulative effect of the individual parameters/factors affecting the system. A model equation for the evaluation and prediction of a clarifier’s performance was developed:
Model: T = T0(-1.36729 + 0.037101∙10λpH + 0.048928t + 0.00741387∙alk)
The developed model will aid the predictiv
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More