This study aimed to synthesize a novel amide prodrug of metformin with aspirin by amide bond. The structure was characterized by (FTIR, 1H-NMR, 13C-NMR and CHNO) ,Purification of the prepared compound was using column chromatography. Using of 40 rabbit having the same weight and devided into 4 groups (4x10) the first group (G1): (the control healthy group) was given drink water and didn’t give any material, second group(G2):( the control infected group) was given hydrogen peroxide concentration % 0.5 until infecting diabetes mellitus, third group(G3): was given hydrogen peroxide concentration as in (G2) and ( 250 mg/kg) of aspirin and (348.8 mg/kg) of metformin, fourth group(G4): was given hydrogen peroxide concentration as in (G2) and (596.3 mg/kg) of the proposed prodrug. After 3 hours, blood was taken from all groups, the serum was separated, and prepared to study it with biochemical and enzymatic study. Statistical data analysis revealed significant decrease in the levels of (lactate dehydrogenase, creatinkinase) , and significant decrease in the concentration of (Glucose) , and significant increase in the concentration of (total protein, albumin, globulin) affected by the prepared Compound [A] as compared with the control infected group. Statistical analysis revealed significant decrease in the levels of (Lactate dehydrogenase) and significant increase in the levels of (creatinkinase) , and significant increase in the concentration of (Glucose, albumin, total protein and globulin) affected by prepared compound [A] as compared with the control healthy group.
B aa cc kk gg r oo uu nn dd : Very low birth weight (VLBW) neonates constitute approximately 4–7 percent of all live births and their mortality is very high. O bb j ee cc t i vv ee: to find out if there is a relationship between Very Low Birth Weight Neonates and increased neonatal mortality for age 0 to 7 days. M ee t hh oo dd ss A retrospective study of VLBW neonates admitted to NICU at Ibn Al- Baladi Pediatrics and Maternity hospital over one year (2012)were studied, study period was from April till August 2013. Exclusion criteria were: (1) neonates weighing less than 700 g and with gestational age less than 24 weeks (abortion) (2) death in the delivery room (3) neonates weighing more than 1500 g. (4) Postnatal age more than 7 days.
... Show MoreThis study includes a physiochemical and a spectrocpical characterization to some alkaloid compounds in the (ANAB AL- THEAB) plant (Solanum nigrun L.). It’s the most important medicinal herb belonging to the family (Solanaceae). Acid hydrolysis was performed by using limited conc. of Hcl and H2SO4, to obtain the aglycon part of previously separated steroidal componants as (A, B and C). The characterization of the(A,B and C) compounds indicates that they varied between them as the separated steroidal like-alkaloids, carried by using melting point (m.p.), thin layer chromatography (TLC), Infra -Red spectroscopy (IR) and Ultra violet-Visible spectroscopy (UV - Visible).High perfor
... Show MoreThis paper aims to propose a hybrid approach of two powerful methods, namely the differential transform and finite difference methods, to obtain the solution of the coupled Whitham-Broer-Kaup-Like equations which arises in shallow-water wave theory. The capability of the method to such problems is verified by taking different parameters and initial conditions. The numerical simulations are depicted in 2D and 3D graphs. It is shown that the used approach returns accurate solutions for this type of problems in comparison with the analytic ones.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThis research aims to predict new COVID-19 cases in Bandung, Indonesia. The system implemented two types of deep learning methods to predict this. They were the recurrent neural networks (RNN) and long-short-term memory (LSTM) algorithms. The data used in this study were the numbers of confirmed COVID-19 cases in Bandung from March 2020 to December 2020. Pre-processing of the data was carried out, namely data splitting and scaling, to get optimal results. During model training, the hyperparameter tuning stage was carried out on the sequence length and the number of layers. The results showed that RNN gave a better performance. The test used the RMSE, MAE, and R2 evaluation methods, with the best numbers being 0.66975075, 0.470
... Show MoreNigella sativa has various pharmacological properties and has been used throughout history for a variety of reasons. However, there is limited data about the effects of N. sativa (NS) on human cancer cells. This study aimed at observing the roles of methanolic extract of N. sativa on apoptosis and autophagy pathway in the Human PC3 (prostate cancer) cell line. The cell viability was checked by MTT assay. Clonogenic assay was performed to demonstrate clonogenicity and Western blot was used to check caspase-3, TIGAR, p53, and LC3 protein expression. The results demonstrated that PC3 cell proliferation was inhibited, caspase-3 and p53 protein expression was induced, and LC3 protein expression was modulated. The clonogenic assay showed that PC3
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
We study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.
After the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of