In the cuurent article, the photophysical properties of 3,6-bis(5-bromothiophen-2-yl)-2,5-bis(2-ethylhexyl)-2,5-dihydropyrrolo[3,4-c]pyrrole-1,4-dione were investigated. The visible absorption bands at 527, 558 and 362 nm in propylene carbonate and the compound was found to be fluorescent in solution and in the plastic film with emission wavelengths between 550- 750 nm. The Stokes Shift of P.C., acetonitrile, diethyl ether, Tetrahydrofuran THF, cyclohexane, dibutyl ether, and dichloromethane DCM are 734, 836, 668, 601, 601, 719, and 804 cm-1 in respectively. The Stokes Shift Δ was less in THF and cyclohexane, than the solvents, which indicates that the energy loss is less between the excitation and fluorescence states. The photophysical characterizations were carried out on the compound in different solvents, the compound displays 12 nm red-shift in the absorption maximum in toluene compared with in propylene carbonate P.C, which the λmax was 558 nm in P.C. The compound displays 5 and 10 red-shifts in the absorption maximum in diethyl ether and dibutyl ether respectively. The absorption band is almost insensitive to the polarity of the solvent, showing only a slight red shift from 563 nm in diethyl ether to 569 nm in cyclohexane and also red shift from 558 nm in acetonitrile to 570 nm in toluene , which appreciably red-shifted depending on the polarity of the solvent. The emission maxima of the dye slightly shift more red region, such as DCM and toluene when compared this compound in other solvents. The dye showed a slight red shift ca. 5 nm on moving from the acetonitrile to the less polar solvent, such as dichloromethane DCM.
Levan is an exopolysaccharide produced by various microorganisms and has a variety of applications. In this research, the aim was to demonstrate the biological activity of levan which produced from B. phenoliresistens KX139300. These were done via study the antioxidant, anti-inflammatory, anticancer and antileishmanial activities in vitro. The antioxidant levan was shown 80.9% activity at 1250 µg/mL concentration. The efficient anti-inflammatory activity of 88% protein inhibition was noticed with levan concentration at 35 µg/mL. The cytotoxic activity of levan at 2500 µg/mL concentration showed a maximum cytotoxic effect on L20B cell line and promastigotes of Leishmani tropica. Levan has dose-dependent anticancer and antileishmanial acti
... Show MoreAn efficient combination of Adomian Decomposition iterative technique coupled with Laplace transformation to solve non-linear Random Integro differential equation (NRIDE) is introduced in a novel way to get an accurate analytical solution. This technique is an elegant combination of theLaplace transform, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (LT
... Show MoreThis paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show MoreCurrent numerical research was devoted to investigating the effect of castellated steel beams without and with strengthening. The composite concrete asymmetrical double hot rolled steel channels bolted back to back to obtain a built-up I-shape form are used in this study. The top half part of the steel is smaller than the bottom half part, and the two parts were connected by bolting and welding. The ABAQUS/2019 program employed the same length and conditions of loading for four models: The first model is the reference without castellated and strengthening; the second model was castellated without strengthened; the third model was castellated and strengthened with reactive powder concrete encased in the
... Show MoreClinical keratoconus (KCN) detection is a challenging and time-consuming task. In the diagnosis process, ophthalmologists must revise demographic and clinical ophthalmic examinations. The latter include slit-lamb, corneal topographic maps, and Pentacam indices (PI). We propose an Ensemble of Deep Transfer Learning (EDTL) based on corneal topographic maps. We consider four pretrained networks, SqueezeNet (SqN), AlexNet (AN), ShuffleNet (SfN), and MobileNet-v2 (MN), and fine-tune them on a dataset of KCN and normal cases, each including four topographic maps. We also consider a PI classifier. Then, our EDTL method combines the output probabilities of each of the five classifiers to obtain a decision b
Background: Angiogenesis is defined as the formation of new blood vessels. However, angiogenesis in cancer will lead to tumour growth and metastasis. Therefore, anti-angiogenesis is one of the ways to slow down growth and spreading of tumour. Moringa oleifera is also known as a “Miracle tree” which has high nutritive value and various therapeutics effect in different parts of the plant. This study aims to determine the anti-angiogenic property of Moringa oleifera leaves extract by using chick chorioallantoic membrane (CAM) assay. Materials and Methods: The extracts were prepared by decoction method using methanol and water. The qualitative phytochemical screening was carried out for
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MoreThe utilization and incorporation of glass fiber-reinforced plastics (GFRP) in structural applications and architectural constructions are progressively gaining prominence. Therefore, this paper experimentally and numerically investigates the use of GFRP I-beams in conjunction with concrete slabs to form composite beams. The experimental design incorporated 2600 mm long GFRP I-beams which were connected compositely to concrete slabs with a 500 mm width and 80 mm thickness. The concrete slabs are categorized into two groups: concrete slabs cast using normal-strength concrete (NSC), and concrete slabs prepared using high-strength concrete (HSC). Various parameters like the type of concrete (normal and high-strength concrete), type of
... Show MoreFlying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct
... Show More