The chemical properties of chemical compounds and their molecular structures are intimately connected. Topological indices are numerical values associated with chemical molecular graphs that help in understanding the physicochemical properties, chemical reactivity and biological activity of a chemical compound. This study obtains some topological properties of second and third dominating David derived (DDD) networks and computes several K Banhatti polynomial of second and third type of DDD.
In this work, we introduced and studied a new kind of soft mapping on soft topological spaces with an ideal, which we called soft strongly generalized mapping with respect an ideal I, we studied the concepts like SSIg-continuous, Contra-SSIg-continuous, SSIg-open, SSIg-closed and SSIg-irresolute mapping and the relations between these kinds of mappings and the composition of two mappings of the same type of two different types, with proofs or counter examples
Background: Although, different protocols of chemotherapy are recommended for the treatment of metastatic breast cancer, still response rates are variable.
Objectives: The aim of this study is to investigate the effects and correlation of different chemotherapy administered to metastatic breast cancer patients on serum levels of some biomarkers.
Patients and methods: Thirty metastatic breast cancer patients were enrolled in the study. The patients received different protocols of chemotherapy. Blood samples were taken from the patients before and after the last cycle of each protocol and from 20 healthy control and serum levels of biomarkers IL-6, leptin, CA 15-3 and p53 were estimated by Elisa.
Results: The mean serum levels of
2-Mercapto quinoline was used as precursor for synthesis of new heterocyclic derivatives of
quinoline nucleus such as pyrazole (3), pyrazolone (4), 1,3,4-oxadiazole (5) and 1,2,4-triazole
(8). New Schiff bases (9a-e) were obtained from the reaction of hydrazide derivative (2) with
miscellaneous aldehydes and ketones. All synthesized compounds were characterized by
physical and spectral data.
This work involves the synthesis and characterization of asymmetrical pyromellitdiimide
derivatives [IV]a-f
by four sequence steps selective reaction . One mole of pyromellitic dianhydride
was reacted with one mole of various primary aromatic amines [ 4-nitro aniline , 4-chloro aniline , 4-toludine and 4-anisidine] in excess of dry acetone to produce six compounds (N-substituted-pyromellitamic monoacid) [I]a-f . These new compounds [I]a-d were converted to the corresponding
N- substituted- pyromellitmonoimide [II]a-d via their heating at (80-90)
0
C in sodium acetate-acetic
anhydride mixture .
The compounds [II]a-f
were allowed to react with one mole of another primary amines in
excess of dry acetone t
This work comprises the synthesis of 18 new N- substituted 5,10-
dihydrophenophosphazine.The diphenylamine was chosen as the starting material ,
which was reacted with phosphorus trichloride at elevated temperature (200-220)0C
for 6 hrs, followed by treating the reaction mixture with water to yield 5,10-
dihydrophenophosphazine-10-oxide(1), this was reacted with ethylchloroacetat to
obtain ethyl(5,10-dihydrophenophosphazine-10- oxide)acetate(2). Compound (2)
was converted to acid hydrazide by treating with hydrazine hydrate( 98% ) to obtain
5-(5,10-dihydrophenophosphazine) acetohydrazide-10-oxide (3). The acid hydrazid
was used to react with phenylisocyanat , phenylthioisocyanat to give (4,7)
respectively which
Abstract
The research aims to determine the nature of the Iraqi market in terms of banking financial stability and the extent impact of the operational efficiency on it, Accordingly, chosen 15 relational banks were chosen as an intentional sample that could represent the Iraqi banking system for the period 2010-2020. The operational efficiency variable was measured according to the data envelope model, and banking financial stability used CAMELS model which includes five indicators (capital adequacy, asset quality, management quality, profitability, and liquidity), so for testing the research hypotheses used the random regression model by adopting the S
... Show MoreBy definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturb
... Show MoreBackground/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreTo maintain a sustained competitive position in the contemporary environment of knowledge economy, organizations as an open social systems must have an ability to learn and know how to adapt to rapid changes in a proper fashion so that organizational objectives will be achieved efficiently and effectively. A multilevel approach is adopted proposing that organizational learning suffers from the lack of interest about the strategic competitive performance of the organization. This remains implicit almost in all models of organizational learning and there is little focus on how learning organizations achieve sustainable competitive advantage . A dynamic model that captures t
... Show More