Objective: Synthesized a series of new thiourea (TU) derivatives, tested their antioxidant activity, and investigated their expected biological activity by theoretical study (computational methods). Methods: The derivatives were made using a one-pot reaction with two steps. Initially, succinyl chloride was mixed with KSCN to make succinyl isothiocyanate. Then, primary and secondary amines were used to make TU derivatives. The theoretical studies were done by Swiss ADME and molecular docking via Genetic Optimization of Linkage Docking (GOLD). Then evaluate antioxidant activity using the DPPH scavenging method. Results: FT-IR, 1H NMR, and 13C NMR spectroscopy show the verification of all the prepared derivatives. Compounds (II), (VIII), (III), and (V) are considered good antioxidant agents compared with L-ascorbic acid as a reference. The most active protein binding sites are on derivatives (IV), (VIII), (II), and (V), respectively. Theoretically, all derivatives have excellent docking scores and good ADME properties. Discussion: Because they have two TU moieties, synthesized derivatives have better docking scores than colchicine in the 1SA0 active site. They also have good ADME properties and antioxidant activity. Conclusions: All synthesized compounds are considered good antioxidant agents. Of all the synthesized compounds, (IV) has the best results compared to colchicine, can be thought of as an excellent antibacterial agent against Escherichia coli, and is an anti-breast cancer.
Non-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for
... Show MoreRegression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh
... Show MoreA Spectroscopic study has been focused in this article to study one of the main types of active galaxies which are quasars, and to be more precise this research focuses on studying the correlation between the main engine of Quasi-Stellar Objects (QSO), the central black hole mass (SMBH) and other physical properties (e.g. the star formation rate (SFR)). Twelve objects have been randomly selected for “The Half Million Quasars (HMQ) Catalogue” published in 2015 and the data collected from Salon Digital Sky survey (SDSS) Dr. 16. The redshift range of these galaxies were between (0.05 – 0.17). The results show a clear linear proportionality between the SMBH and the SFR, as well as direct proportional between the luminosit
... Show MoreThere are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called grap
... Show MoreThe bit record is a part from the daily drilling report which is contain information about the type and the number of the bit that is used to drill the well, also contain data about the used weight on bit WOB ,revolution per minute RPM , rate of penetration ROP, pump pressure ,footage drilled and bit dull grade. Generally we can say that the bit record is a rich brief about the bit life in the hole. The main purpose of this research is to select the suitable bit to drill the next oil wells because the right bit selection avoid us more than one problems, on the other hand, the wrong bit selection cause more than one problem. Many methods are related to bit selection, this research is familiar with four of thos
... Show MoreLet be an infinite dimensional separable complex Hilbert space and let , where is the Banach algebra of all bounded linear operators on . In this paper we prove the following results. If is a operator, then 1. is a hypercyclic operator if and only if D and for every hyperinvariant subspace of . 2. If is a pure, then is a countably hypercyclic operator if and only if and for every hyperinvariant subspace of . 3. has a bounded set with dense orbit if and only if for every hyperinvariant subspace of , .
Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the p
... Show MoreThe current research dealt with the rapid development of industrial product design in recent times, and this development in the field of design led to the emergence of modern trends in many terms and theories to direct greater interest in the cognitive foundations of design and its relationship with the components of other natural sciences, and despite the impressive technological development, nature remains With its content of formative values and structural dimensions, it is the first source of inspiration and the source of all modern mathematical sciences and theories, as God made them tend towards organization to continue to provide us with endless inspiration. Hence, the fractional one, which is an important part of dedicating the d
... Show More