A new Mannich base ligand was prepared by reacting the 2-chloro.-N-(5-mercapto-1, 3, 4-thiadazol -2-yl) acetamide and Piperidine in the presence (formaldehyde) (L) ligand. A series of ligand complexes were prepared from (L) with the metal ion Co (II), Ni (II), Cu (II), Pd (II), Pt (IV), and Au (III). Various spectroscopic techniques such as C.H.N.S, FTIR, UV-VIS, , 1HNMR, 13CNMR, Magnetic moment, and molar conductivity successfully characterize the obtained compounds. The M: L ratio was determined using the molar ratio method in solution. All prepared compounds' antibacterial and antifungal activity was studied against two types of bacteria and one type of fungi at a rate of 0.02M. The standard ΔH° f and ΔEb of the ligands and all the prepared complexes were calculated using Hyperchem 8.0.7 program, and the study proved that the complexes are more stable than the ligands. In addition, the vibrational frequencies of the ligand were calculated, and the theoretical error rate of the process was calculated.
Background and Objectives: Urinary tract infections (UTIs), among a wide range of microbial infections, are of a double-edged worry with health-care and economic implications. They are serious diseases that can influence various parts of the urinary tract. The aim of this study was characterization of the enteric bacteria isolated from urine of human UTIs and studying their antimicrobial sensitivity. Materials and methods: A total of 50 urine samples were collected from patients with UTIs of both genders. The isolates identification was done using routine diagnostic methods and confirmed by Vitek2. Antimicrobial susceptibility was done against 10 antimicrobials. Results: Both genders of human were found to suffer from urinary tract problems
... Show MoreThe most common artifacts in ultrasound (US) imaging are reverberation and comet-tail. These are multiple reflection echoing the interface that causing them, and result in ghost echoes in the ultrasound image. A method to reduce these unwanted artifacts using a Otsu thresholding to find region of interest (reflection echoes) and output applied to median filter to remove noise. The developed method significantly reduced the magnitude of the reverberation and comet-tail artifacts. Support Vector Machine (SVM) algorithm is most suitable for hyperplane differentiate. For that, we use image enhancement, extraction of feature, region of interest, Otsu thresholding, and finally classification image datasets to normal or abnormal image.
... Show MoreIn this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.
In this paper, we proved that if R is a prime ring, U be a nonzero Lie ideal of R , d be a nonzero (?,?)-derivation of R. Then if Ua?Z(R) (or aU?Z(R)) for a?R, then either or U is commutative Also, we assumed that Uis a ring to prove that: (i) If Ua?Z(R) (or aU?Z(R)) for a?R, then either a=0 or U is commutative. (ii) If ad(U)=0 (or d(U)a=0) for a?R, then either a=0 or U is commutative. (iii) If d is a homomorphism on U such that ad(U) ?Z(R)(or d(U)a?Z(R), then a=0 or U is commutative.
Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando
... Show MoreBackground: The hepatitis G virus( HGV), also called hepatitis GB virus, as a member of the Flaviviridae family distantly related to hepatitis C virus (HCV), Little is known about the frequency of HGV infection, the nature of the illness, or how to prevent it. What is known is that transfused blood containing HGV has caused some cases of hepatitis. They infect humans, but are not known to cause human disease. This virus can be transmitted efficiently by blood transfusion and by other parenteral mechanisms. Transient and long lasting infections with HGV have been documented in man.
Patients and methods: HBs Ag, Anti-HCV IgG and Anti-HGV IgG were detected by Enzyme-Linked Immunosorbent Assay (ELISA).HCV RNA