Recently, some prostate cancer patients have acquired resistance to the second -generation drugs (anzalutamide and apalutamide) prescribed for the treatment of this disease due to the emergence of the F876L mutation, which represents a challenge to modern medicine. In this study, a new series of 2-thiohydantoin derivatives were prepared through the reaction of different derivatives of maleimide (1c-4c) with isothiocyanate derivatives. The prepared compounds were diagnosed using FT-IR,1H-NMR ,13C-NMR, Mass spectra. The prepared series compounds has been studied against prostate cancer cells. The MTT assay was used to determine the activity of the prepared compounds against prostate cancer cells. The data indicated, depending on the IC50 values, that some of the prepared compounds have anti-prostate cancer activity. The results indicate that compounds 1d and 2d have good anti-prostate cancer activity compared to the rest of the compounds. The prepared series of compounds were also studied against selected types of bacteria and fungi, as the results showed that some of the compounds in the series had anti-bacterial and anti-fungal activity.
The current study aimed to assess the biological efficacy of the triple arbuscular mycorrhiza (AM) mixture of fungi Glomus etunicatum, G. leptotichum and Rhizophagus intraradices, and mix it with organic matter (O) and pathogenic fungi Fusarium oxysporum f.sp.lycopersici by using voyeurism in the plastic house in the growth of the tomato plant after four and eight weeks of cultivation. The results were shown after the treatment of the tomato plant in agriculture with the mixture of mycorrhiza and the pathogenic fungi and organic matter were treated with the mixture of mycorrhiza, organic matter and pathogenic fungi together. The effect of mycorrhiza and organic matter interference on the increase in the percentage of the lignin afte
... Show MoreYeasts are distributed in all environments and have been reported as potential biocontrol agents against various phytopathogenic fungi. To investigate their enzymatic and biological activities, 32 yeasts were isolated from 15 date vinegar samples. Evaluation of the antagonistic activities of isolated yeasts against the plant pathogens Fusarium oxysporium, Sclerotinia sclerotiorum, and Macrophomina phaseolina indicated that there are two yeasts had the highest inhibitory effect against plant pathogens, these yeasts identified as Kluyveromyces marxianus and Torulaspora delbrueckii using traditional and molecular methods. These yeast isolates were tested for fungal cell wall degrading enzymes (in vitro), and results indicated that the
... Show MoreTrimethoprim derivative Schiff bases are versatile ligands synthesized with carbonyl groups from the condensation of primary amines (amino acids). Because of their broad range of biological activity, these compounds are very important in the medical and pharmaceutical fields. Biological activities such as antibacterial, antifungal and antitumor activity are often seen. Transition metal complexes derived from biological activity Schiff base ligands have been commonly used.
Trimethoprim derivative Schiff bases are versatile ligands synthesized with carbonyl groups from the condensation of primary amines (amino acids). Because of their broad range of biological activity, these compounds are very important in the medical and pharmaceutical fields. Biological activities such as antibacterial, antifungal and antitumor activity are often seen. Transition metal complexes derived from biological activity Schiff base ligands have been commonly used
In this research, we introduce and study the concept of fibrewise bitopological spaces. We generalize some fundamental results from fibrewise topology into fibrewise bitopological space. We also introduce the concepts of fibrewise closed bitopological spaces,(resp., open, locally sliceable and locally sectionable). We state and prove several propositions concerning with these concepts. On the other hand, we extend separation axioms of ordinary bitopology into fibrewise setting. The separation axioms we extend are called fibrewise pairwise T_0 spaces, fibrewise pairwise T_1 spaces, fibrewise pairwise R_0 spaces, fibrewise pairwise Hausdorff spaces, fibrewise pairwise functionally Hausdorff spaces, fibrewise pairwise regular spaces, fibrewise
... Show MoreThis research work aims to the determination of molybdenum (VI) ion via the formation of peroxy molybdenum compounds which has red-brown colour with absorbance wave length at 455nm for the system of ammonia solution-hydrogen peroxide-molybdenum (VI) using a completely newly developed microphotometer based on the ON-Line measurement. Variation of responses expressed in millivolt. A correlation coefficient of 0.9925 for the range of 2.5-150 ?g.ml-1 with percentage linearity of 98.50%. A detection limit of 0.25 ?g.ml-1 was obtained. All physical and chemical variable were optimized interferences of cation and anion were studied classical method of measurement were done and compared well with newly on-line measurements. Application for the use
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper deals with constructing mixed probability distribution from mixing exponential