The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreThe - M ultiple mixing ratios of -transitions from levels of 56Fe populated in 56 56 Fe n n Fe ( , ) reactions are calculated by using const. S.T.M. This method has been used in other works [3,7] but with pure transition or with transitions that can be considered as pure transitions، in our work we used This method for mixed - transitions in addition to pure - transitions. The experimental angular distribution coefficients a2 was used from previous works [1] in order to calculet - values. It is clear from the results that the - values are in good agreement or consistent, within associated errors, with those reported previously [1]. The discrepancies that occur are due to inaccuracies existing in the expe
... Show MoreThe -mixing of - transition in Er 168 populated in Er)n,n(Er 168168 reaction is calculated in the present work by using a2- ratio method. This method has used in previou studies [4, 5, 6, 7] in case that the second transition is pure or for that transition which can be considered as pure only, but in one work we applied this method for two cases, in the first one for pure transition and in the 2nd one for non pure transitions. We take into accunt the experimental a2- coefficient for p revious works and -values for one transition only [1]. The results obtained are, in general, in agood agreement within associated errors, with those reported previously [1], the discrepancies that occur are due to inaccuracies existing
... Show MoreAn easy, eclectic, precise high-Performance Liquid Chromatographic (HPLC) procedure was evolved and validated to estimate of Piroxicam and Codeine phosphate. Chromatographic demarcation was accomplished on a C18 column [Use BDS Hypersil C18, 5μ, 150 x 4.6 mm] using a mobile phase of methanol: phosphate buffer (60:40, v/v, pH=2.3), the flow rate was 1.1 mL/min, UV detection was at 214 nm. System Suitability tests (SSTs) are typically performed to assess the suitability and effectiveness of the entire chromatography system. The retention time for Piroxicam was found to be 3.95 minutes and 1.46 minutes for Codeine phosphate. The evolved method has been validated through precision, limit of quantitation, specificity,
... Show MoreAllosteric inhibition of EGFR tyrosine kinase (TK) is currently among the most attractive approaches for designing and developing anti-cancer drugs to avoid chemoresistance exhibited by clinically approved ATP-competitive inhibitors. The current work aimed to synthesize new biphenyl-containing derivatives that were predicted to act as EGFR TK allosteric site inhibitors based on molecular docking studies.
A new series of 4'-hydroxybiphenyl-4-carboxylic acid derivatives, including hydrazine-1-carbothioamide (S3-S6) and 1,2,4-triazole (S7-S10) derivatives, were synthesized and characterized using IR, 1HNMR, 13CNMR
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show More