Infection with cryptosporidiosis endangers the lives of many people with immunodeficiency, especially HIV patients. Nitazoxanide is one of the main therapeutic drugs used to treat cryptosporidiosis. However, it is poorly soluble in water, which restricts its usefulness and efficacy in immunocompromised patients. Surfactants have an amphiphilic character which indicates their ability to improve the water solubility of the hydrophobic drugs. Our research concerns the synthesis of new cationic Gemini surfactants that have the ability to improve the solubility of the drug Nanazoxide. So, we synthesized cationic Gemini surfactants. N1,N1,N3,N3-tetramethyl-N1,N3-bis(2-octadecanamidoethyl)propane-1,3-diaminium bromide (CGSPS18) and 2,2‘-(ethane-1,2-diylbis(oxy))bis(N-(2-octadecanamidoethyl)-N,N-dimethyl-2-oxoethane-1-aminium) dichloride (CGSES18) and the detection of their chemical composition by spectroscopic methods, as well as studying the properties of their surfaces and their toxicity. Furthermore, the efficacy of nitazoxanide in infected mice was studied in conjunction with three different doses of surfactants. To assess the effect of nitazoxanide and surfactants, the infection was parasitologically counted before and after treatment, and the intestinal, liver, and lung tissues were also examined histopathologically. In this study, it was found that the combination of the drug nitazoxanide with surfactants, especially the compound (CGSPS18) at a concentration of 25% increased the efficacy and resulted in a percentage reduction of 90.8%. Histopathological examination revealed that the group treated with the drug nitazoxanide in combination with CGSPS18 showed the best results exhibiting an almost normal villous pattern. This study demonstrated an increase in the effectiveness of nitazoxanide when combined with surfactants, and this suggests a promising future for the use of surfactants as an adjunct to enhance the effectiveness of nitazoxanide for the treatment of cryptosporidiosis in immunocompromised patients, particularly HIV patients.
Semi-parametric models analysis is one of the most interesting subjects in recent studies due to give an efficient model estimation. The problem when the response variable has one of two values either 0 ( no response) or one – with response which is called the logistic regression model.
We compare two methods Bayesian and . Then the results were compared using MSe criteria.
A simulation had been used to study the empirical behavior for the Logistic model , with different sample sizes and variances. The results using represent that the Bayesian method is better than the at small samples sizes.
... Show MoreNew complexes of the [M(Ura)(Phen)(OH2)Cl2]Cl.2H2O type, where (Ura) uracil ; (Phen) 1,10-phenanthroline hydrate; M (Cr+3 , Fe+3 and La+3) were synthesized from mix ligand and characterized . These complexes have been characterized by the elemental micro analysis, spectral (FT-IR., UV-Vis, 1HNMR, 13CNMR and Mass) and magnetic susceptibility as well the molar conductive mensuration. Cr+3, Fe+3 and La+3- complexes of six–coordinated were proposed for the insulated for three metal(III) complexes for molecular formulas following into uracil property and 1,10-phenanthroline hydrate present . The proposed molecular structure for all metal (III) complexes is octahedral geometries .The biological activity was tested of metal(III) salts, ligands
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory char
... Show MoreInformation and Communication Technology revolution has led to the emergence of electronic payment systems and their means And that the replacement of these modern means replace the traditional means (legal money) issued by the Central Bank has influenced the performance of monetary policy, especially that monetary policy is one of the most important policies used to achieve economic stability , The aim of the research is To know the impact of electronic payment systems on the tools of monetary policy as these means, such as cards and electronic money issued by credit institutions and companies, that is, the Central Bank is not responsible for issuance and spread And the lack of regulation by the Central Bank will lea
... Show MoreIn this study, active knife and fixed knife of single-row disc silage machine has three different clearance C1, C2 and C3 (1, 3 and 5 mm) and it is tried in three different working speed V1, V2 and V3 (1.8, 2.5 and 3.7 km / h) and PTO speed (540 min-1) and machine's fuel consumption (l/h), average power consumption (kW), field energy consumption (kW/da), product energy consumption (kW/t), field working capacity (da/h), product working capacity (t/h) and Chopping size distribution characteristics of the fragmented material were determined. It has been found that knife-counter knife clearances smaller than 3 mm (1 mm) and larger (5 mm) have a negative effect on machine performance in general. In terms of fuel and power consumptions, the m
... Show More