The purpose of this research work is to synthesize conjugates of some NSAIDs with sulfamethoxazole as possible mutual prodrugs to overcome the local gastric irritation of NSAID with free carboxyl group by formation of ester linkage that supposed to remain intact in stomach and may hydrolyze in intestine chemically or enzymatically; in addition to that attempting to target the synthesized derivative to the colon by formation of azo group that undergo reduction only by colonic bacterial azo reductaze enzyme to liberate the parent compound to act locally (treatment of inflammation and infections in colon)
Thirty nine (12.8%) isolates of Staphylococcus aureus were isolated from 304 healthy human (Nasal swabs). It was found that percentage of males that have S. aureus is more than female's percentage. These isolates (39) were tested with different tests. Twenty seven isolates (69.23 %) were positive for Staphylococcus protein —A (SPA) ,thirty seven ( 94.8 %) were positive for tube coagulase , thirty five ( 89.7 % ) were positive with clumping factor and thirty two ( 82.05 %) had 13 — hemolytic on blood agar. It was found that 100% of the isolates (39 isolates) were positive with one, two or three tests (tube coagulase, clumping factor and SPA).
The addition of new reactive sites on the surface area of the inert sand, which are represented by layered double hydroxide nanoparticles, is the primary goal of this work, which aims to transform the sand into a reactive material. Cetyltrimethylammonium bromide (CTAB) surfactant is used in the reaction of calcium extracted from solid waste-chicken eggshells with aluminum prepared from the cheapest coagulant-alum. By separating amoxicillin from wastewater, the performance of coated sand named as "sand coated with (Ca/Al-CTAB)-LDH" was evaluated. Measurements demonstrated that pH of 12 from 8, 9, 10, 11, and 12, CTAB dosage of 0.05 g from 0, 0.03, 0.05, and 0.1 g, ratio of Ca/Al of 2 from 1, 2, 3, and 4, and mass of sand of 1 g/50 mL from
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreMachine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To
... Show MoreNowadays, Wheeled Mobile Robots (WMRs) have found many applications as industry, transportation, inspection, and other fields. Therefore, the trajectory tracking control of the nonholonomic wheeled mobile robots have an important problem. This work focus on the application of model-based on Fractional Order PIaDb (FOPID) controller for trajectory tracking problem. The control algorithm based on the errors in postures of mobile robot which feed to FOPID controller to generate correction signals that transport to torque for each driven wheel, and by means of dynamics model of mobile robot these torques used to compute the linear and angular speed to reach the desired pose. In this work a dynamics model of
... Show MoreA high-performance liquid chromatography method was employed for the quantitative determination of ascorbic acid (AA) which called vitamin C in three types of Iraqi citrus (orange mandarin and aurantium ) and to establish this goal , evaluation of ascorbic acid degradation is so important due to its significant criticality when exposure to ordinary atmospheric conditions. The chromatographic analysis of AA was carried out after their sequential elution with KH2PO4 ( as mobile phase) by reverse-phase HPLC technique with C8 column and UV detection at 214 nm. .Bad resolutions was appeared clearly for C8 column , so another alternative condition were carried out to improve the resolution by replacement of C8 by C18 column .Statistical treat
... Show MoreEntropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More