Background: Folic acid (vitamin B9) is one of the important vitamins that are necessary for growth and development of the embryo and preventing the occurrence of congenital malformations which are one of the important health problems in the developing countries and the world as it has a direct effect on the affected babies, their families and the community. It affects an estimated 3% of newborns worldwide.Periconceptional supplementation with folic acid (before conception and during the first 12 weeks of pregnancy) was found to decrease many important types of these anomalies. Objectives: The aim of this study is to assess knowledge, attitude and practice of periconceptional use of folic acid in pregnant women who are attending antenatal care unit in three Primary Health Care Centers in Baghdad / AL-Russafa side. Type of the study: Descriptive cross-sectional study Patients and Methods: The study used a convenient sample technique for pregnant women who are attending antenatal care unit in three primary health care centers in Baghdad/ALـRussafa at the period from January to April 2014. The sample size was 200. Non-pregnant women were excluded. Results: a large proportion (86%) of pregnant women who had been interviewed knew about folic acid. 61% of them gained the information about it from doctors and 44.5% know its importance in protection from congenital anomalies. Although there was a good practice regarding folic acid supplementation during the current pregnancy; only 10% of them had used it in the proper time (at least one month before pregnancy to the end of the first trimester). It has been found that the largest rate of its use was in the second month (28%), Still 22% of them realize that it must be taken before pregnancy. Conclusion: From 200 pregnant women interviewed in the current study, the majority knew about folic acid but nearly only half of them states its importance in protection from congenital anomalies. Most of the women usedfolic acid in the current pregnancy on a daily bases and take it as pure folic acid. Although some of the pregnant women were aware about the proper time of taking folic acid, only few took it before pregnancy. Doctors were the main source of information.
In this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C
... Show MoreA series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreSynthesis and preliminary biological evaluation of imidazo (2, 1-b) Thiazole derivatives is reported. Under Mannich conditions, a series of new imidazo (2, 1-b) Thiazole derivatives were synthesized. Starting from the reaction of 2- amino thiazole with 4- bromo phenyl bromide to produce 5-(4-bromo phenyl) imidazo (2, 1-b) thiazoles, following by introduce the substituted aminomethyl at position 6-by reacting with different aromatic amines under Mannich conditions to afford 6-secondary amine-5-(4-bromo phenyl) imidazo (2,1-b) thiazole in high yields.
FT-IR, 1H NMR, and 13C NMR techniques were used to characterize the synthesized derivatives. In addition, all compounds were tested for their antioxidant activity, and thr
... Show MoreThis work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.
The theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreThis study included partial purification of the lipase enzyme from the karnel of the pecan nut. After applying ion exchange chromatography technique using CM-Cellulose, two lipase isoenzymes were observed with specific activity values of 2.66 and 1.7 units/mg protein. The highest activity of both isoenzymes appeared at the optimum pH values of 8 and 6 and at temperatures of 40 and 50 °C, respectively. A pure single band was obtained by using electrophoresis technique and it was found that the approximate molecular weight was 42 kDa for the two isoenzymes. The study dealt with the preparation of the diester compound 1,4-diacetoxybenzene, which was diagnosed by GC-MS and 1H NMR spectrometry. When studying the inhibitio
... Show More