In this research, the kinetic studies of four isoenzymes of Asprtate aminotransferase, which partially purified from the urine of chronic renal failure patients were carried out .The four isoenzymes were obeyed Michaelis-Menton's equation and the optimum concentration of their substrate (Aspartic acid) was (166.5x10-3) mole/liter,and their Km values were determined. Four isoenzymesI,II,III,IV have shown an optimum pH at 7.4.The four isoenzymes obeyed Arrhenius equation up to 37º C and their Ea and Q10 constants were determined .
In recent years , the interest in gold (III) species have gained more and more attention for cancer chemotherapy , this was stimulating by the possibility to develop new agents with mode of action and clinical profile different from the established platinum metalodrugs.
With this frame, recently new square planar Au(III) complexes (Au(L)(L')n); where L=SCH2COO- ; L'=HSCH2COO- had been synthesized with S/O – donor ligands.
In this article and by the aim to replace, one of (L') ligand by anion chloride ligand (which supposedly more relevant for the biodistribution of the compound than for its pharmacodynamic effects), new complex (Au(L')
Accurate description of thermodynamic, structural, and electronic properties for bulk and surfaces of ceria (CeO2) necessitates the inclusion of the Hubbard parameter (U) in the density functional theory (DFT) calculations to precisely account for the strongly correlated 4f electrons. Such treatment is a daunting task when attempting to draw a potential energy surface for CeO2-catalyzed reaction. This is due to the inconsistent change in thermo-kinetics parameters of the reaction in reference to the variation in the U values. As an illustrative example, we investigate herein the discrepancy in activation and reaction energies for steps underlying the partial and full hydrogenation of acetyl
... Show MoreBackground: Anti-oxidants are used as supplements to counteract the over production of free radicals in periodontal disease.Co-Q10 functions as an intercellular antioxidant by acting as a primary scavenger of free radicals (FRs) and reactive oxygen species (ROS), this study aimed to evaluate the effect of intra pocket application of perio Q gel (coenzyme Q10) alone and as adjunct to scaling and root planing on the periodontal clinical parameters in the treatment of patients with chronic periodontitis and compare the better improvement on the clinical periodontal parameters among different treatment modalities at 3 and 6 weeks. Materials and methods: A total of 323 sites with pocket depth (5-8) mm in patients with chronic periodontitis were
... Show MoreThe beet armyworm (BAW), Spodoptera exigua (Lepidoptera: Noctuidae) is a highly destructive pest of vegetables and field crops. Management of beet armyworm primarily relies on synthetic pesticides, which is threatening the beneficial community and environment. Most importantly, the BAW developed resistance to synthetic pesticides with making it difficult to manage. Therefore, alternative and environment-friendly pest management tactics are urgently required. The use of pesticidal plant extracts provides an effective way for a sustainable pest management program. To evaluate the use of pesticidal plant extracts against BAW, we selected six plant species (Lantana camara, Aloe vera, Azadirachta indica, Cymbopogon citratus, Nicotiana tabacum ,
... Show MoreThe title compound, [Ru(C12H7Br2N2)2(CO)2], possesses a distorted octahedral environment about the Ru atom, with two cyclometallated 4,4′-dibromoazobenzene ligands and two mutually cis carbonyl ligands. The donor atoms are arranged such that the N atoms are mutually trans and the aryl C atoms are trans to carbonyl ligands.
في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More