The formation of Co(II), Ni(II), Cu(II), Zn(II), and Cd(II)-complexes (C1-C5) respectively was studied with new Schiff base ligand [benzyl(2-hydroxy-1-naphthalidene) hydrazine carbodithioate derived from reaction of 2-hydroxy-1-naphthaldehyde and benzyl hydrazine carbodithioate. The suggested structures of the ligand and its complexes have been determined by using C.H.N.S analyzer, thermal analysis, FT-IR, U.V-Visible, 1HNMR, 13CNMR , conductivity measurement , magnetic susceptibility and atomic absorption. According to these studies, the ligand coordinates as a tridentate with metal ions through nitrogen atom of azomethane , oxygen atom of hydroxyl, and sulfur atom of thione and the ratio of ligand to metal (M:L) as (1:2) all the complexes were octahedral except copper-complex was distorted octahedral.
Background: Hypothyroidism is the most abundant thyroid disorder worldwide. For decades, levothyroxine was the main effective pharmacological treatment for hypothyroidism. A variety of factors can influence levothyroxine dose, such as genetic variations. Studying the impact of genetic polymorphisms on the administration of medications was risen remarkably. Different genetic variations were investigated that might affect levothyroxine dose requirements, especially the deiodinase enzymes. Deiodinase type 2 genetic polymorphisms’ impact on levothyroxine dose was studied in different populations. Objective: To examine the association of the two single nucleotide polymorphism (SNP)s of deiodinase type 2 (rs225013 and rs225014) and le
... Show MoreThe corrosion behavior of mild sleet in saturated aerated and de-aerated Ca(OH)2 solution was investigated using electrochemical measurements. The work was carried out with small coupons immersed in solutions containing different quantities of NaCl in presence of various NaN02 concentrations as corrosion inhibitors. It has been found thal:(1 ) In presence of NaCl, the time required to reach O2 evolution potential in de-aerated Ca(OH)2 polarized at 10μA/cm 2 is function of inhibitor concentration and it becomes lass as NaN02 increases compared with zero presence indicating the effectiveness of N
... Show MoreBackground: Hypothyroidism is the most abundant thyroid disorder worldwide. For decades, levothyroxine was the main effective pharmacological treatment for hypothyroidism. A variety of factors can influence levothyroxine dose, such as genetic variations. Studying the impact of genetic polymorphisms on the administration of medications was risen remarkably. Different genetic variations were investigated that might affect levothyroxine dose requirements, especially the deiodinase enzymes. Deiodinase type 2 genetic polymorphisms’ impact on levothyroxine dose was studied in different populations.
Objective: To examine the association of the two single nucleotide polymorphism (SNP)s of deiodinase t
... Show MoreAbstract The results showed that after treating <italic>C. albicans</italic> with Artemisinin (0.104 mg/ml) for 3 hours the number of <italic>C. albicans</italic> decreased and affected the morphology hyphae and growth of <italic>Candida</italic> compared with Fluconazole (150 mg/ml) and control (infected mice). The biomarker levels in the tongue showed high levels of MDA and TGFβ (623±1.5pg/ml, 586.1±0.13pg/ml respectively) in (infected mice with fungi). IL-37 was recorded high level (49.21±0.21pg/ml) in (Neoral +Fungi + artemisinin + fluconazole) compared with negative control. The finding biomarker levels in stomach showed high levels of MDA and IL-37 (533.8±1.9, 69.76±0.39pg/ml) in (Neor
... Show MoreThe purpose of the current study was to explore the standards that teachers take into consideration when selecting and using assistive technology (AT), in addition to their knowledge and skills in this area. A quantitative, descriptive survey design was used and a convenience sample of 79 teachers of students with intellectual disabilities and autism spectrum disorder (ASD) participated in the current study. Based on the four main areas of the SETT Framework—student, environment, tasks, and tools—, teachers reported a lack consideration for most of the standards in each area. Among other findings, statistically significant differences were found between teachers’ standards of the SETT Framework, with teachers who had previous profe
... Show MoreThis work concerns the thermal and sound insulation as well as the mechanical properties of polymer matrix composite reinforced with glass fibers. These fibers may have dangerous effect during handling, for example the glass fibers might cause some damage to the eyes, lungs and even skin. For this reason the present work, investigates the behavior of polymer composite reinforced with natural fibers (Plant fibers) as replacement to glass fibers. Unsaturated Polyester resin was used as matrix material reinforced with two types of fibers, one of them is artificial (Glass fibers) and the other type is natural (Jute, Fronds Palm and Reed Fibers) by hand lay-up technique. All fibers are untreated with any chemical solvent. The Percentage of mi
... Show MoreIn this work, production of silicon metal at high purity of 99% by using Iraqi–starting materials (Iraqi sand and plant coal)was reported, electric arc–furnaces assembly was manufactured inside, the graphite electrodes were made from graphite scrap, this system is operate to produce about 800 gm /6hr of silicon metal to meet the need for manufacturing silicon oils, resins, solar cells, and electronic parts. The procedure, equipments and analysis data were described as well.
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More
