Polyvinal alcohol was Cynoethylated , complex compound with Iodin in presence of Cu++ ions were preparated and their ultra violet (U.V) and infra red( IR) spectra were investigated. The prepared derivative and complexes were evaluated as antibacterial and antifungal agents following the standard dilution method. MIC(minimum inhibitory concentration) for each polymer using ten types of gram + ve and gram _ ve bacteria were determinated in addition to three types of fungi. The results obtainded showed that MIC, s were around 0.0011 × 103 molar for different polymetric derivatives tried.
This study is to evaluate plasma levels of several cytokines in preeclamptic pregnancies compared to those of healthy pregnancies. Ninety pregnant women with preeclampsia (37 mild & 53 severe) and thirty healthy pregnant women were enrolled in the study. Blood samples were taken and plasma levels of IL-8, IL-10, and IFN-? were measured by enzyme-linked immunosorbent assay (ELISA). Preeclamptic women and their severe cases but not mild cases had significantly (P<0.05) increased levels of plasma IL-8, and IFN-? as compared with healthy pregnancies. By contrast, plasma levels of IL-10 was significantly (P<0.05) increased in healthy pregnant women as compared to all groups of preeclampsia. Preeclampsia is associated with an imbalance betwe
... Show MoreThe measurement of vitamin B1 in pure and pharmaceutical formulations was proposed by using a straightforward and sensitive spectrophotometric approach. Sulfacetamide (SFA) is diazotized, then coupled with vitamin B1 in alkaline media to produce a colored azo dye complex with a stability constant of 5.597 × 105 L/mol. The product is stable, with a maximum absorption wavelength of 489.5 nm, molar absorptivity of 10108 L/mol∙cm, Sandell's sensitivity of 0.0334 μg/cm2, detection limit of 0.0135 μg/mL, and Beer's law being observed over the concentration range of 0.2–20.0 μg/mL. The stability constant and stoichiometry of the produced azo dye were calculated using the continuous variation (Job's) and mole ratio methods. The suggested ap
... Show MoreRecurrent respiratory tract infections are responsible for about 85% of all diseases in childhood, and are associated with significant morbidity and mortality. The aim of this study is to evaluate the main causes underlying recurrent respiratory tract infections in 176 pediatric patients aged 2 month to 4 year and weight from 4 to11 kg referred to the child center hospital and Al-sader hospital prospective study.All parents were given information sheet which then analyzed and the percentage of incidence of causes were recorded, we found that higher % related to many causes; mostly related to the parent like poor family education, mother carelessness, incomplete vaccination, other related to empirical diagnosis, and short course of t
... Show MoreIn this work, optical system with different aperture shapes (circular, square, elliptical and triangle aperture) has been used for efficiency evaluation when the system involved moving factor in ideal case (aberration free). The optical system evaluate far moving object, therefore the image forming at image plane due to point spread function (image formula of incoherently illuminated point object). A mathematical treatment has been used to getting results by Gaussian numerical calculations method. The results show priority of circular aperture when optical system that submits of moving factor.
Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreBackground: The repair of bone defects remains a major clinical orthopaedic challenge. Bone is a highly vascularised tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. This study aimed to study the efficacy of Panax ginseng as a osteoinducer in tibia of rat and as a stimulator for bone healing and to study the immunohistochemical expression of osteonectin as bone formation markers in experimental and control groups during bone healing. Material and method: : In this study thirty albino male rats , weighting (200-300) gram ,aged (2-3) months ,will be used under control conditions of temperature ,drinking and food consumption. The animals will subject for an
... Show MoreBackground: The study aimed to investigate the effect of different techniques of en masse retraction on the vertical and sagittal position, axial inclination, rate of space closure, and type of movement of maxillary central incisor. Materials and methods: A typodont simulation system was used (CL II division 2 malocclusion). Three groups were used group 1(N=10, T-loop), group 2(N=10, Time-Saving loop), and group 3(N=10, Microimplant). Photographs were taken before and after retraction and measurements were made using Autodesk AutoCAD© software 2010. Kruskal-Wallis one-way analyses of variance and Mann-Whitney U test (p?0.05) were used. Results: The rate of space closure showed no significant difference among the three groups (p?0.05), whi
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More