Flexible molecular docking is a computational method of structure-based drug design to evaluate binding interactions between receptor and ligand and identify the ligand conformation within the receptor pocket. Currently, various molecular docking programs are extensively applied; therefore, realizing accuracy and performance of the various docking programs could have a significant value. In this comparative study, the performance and accuracy of three widely used non-commercial docking software (AutoDock Vina, 1-Click Docking, and UCSF DOCK) was evaluated through investigations of the predicted binding affinity and binding conformation of the same set of small molecules (HIV-1 protease inhibitors) and a protein target HIV-1 protease enzy
... Show MoreSamples of the ovary and uterus of local breed cats used to investigate the histological, histometrical and hormonal features. The paraffin embedding technique was used for processing of tissue that stained by hematoxyline and eosin stain, and massons trichrom stain. Ovary of at proestrus or oestrus phases composed of outer cortex that covered by cuboidal germinal epithelium and inner medulla. Tunica albuginea composed of a thin layer of characterized by fusiform stromal cells. The cortex content groups of Oogonial cells, numerous primordial follicles, little primary, secondary and tertiary follicles in addition for 1-2 follicular cysts and mature corpus letium. In pregnant cat the thickness of ovarian cortex was significantly incre
... Show MoreBackground: Langerhans' cell histiocytosis (LCH) is a group of conditions affecting the reticuloendothelial system. It includes Letterer-Siwe disease, Hand-Schuller-Christian disease and eosinophilic granuloma and most often presents in childhood. Materials and methods: Twenty-five cases of LCH were diagnosed histologically and confirmed by CD1a antibody and assessed immunohistochemically using anti-RANKL and anti-RANK antibodies to evaluate osteoclastogenic mechanism. Results: Regarding jaw cases, there was a significant correlation between CD1a and RANK (P=0.016). While in the skull, highly significant correlation existed between RANK and RANKL (p=0.001). Among the sites, there was no statistically significant difference found for each
... Show MoreBackground: Controversy exists concerning the presence and amount of the Bennett mandibular immediate side shift among patients and whether it is necessary to accommodate for it in adjustable articulators. The aim of this study was to register and calculate the amount of any immediate side shift (ISS) present in patients requiring full mouth rehabilitation. Materials and methods: 3- dimensional condylar movements of 50 Iraqi TMD-free patients were recorded using a stereographic fully adjustable articulator system during protrusion, left and right eccentric mandibular movements. Protrusive angles of each patient were verified to figure out the suitable fossa analog for each case. The thickness of each right and left premade fossa analog sele
... Show MoreAlthough renewable energy systems have become an interesting global issue, it is not continuous either daily or seasonally. Latent heat energy storage (LHES) is one of the suitable solutions for this problem. LHES becomes a basic element in renewable energy systems. LHES compensate for the energy lack when these systems are at low production conditions. The present work considered a shell and tube LHES for numerical investigation of the tube rotation influence on the melting process. The simulation and calculations were carried out using ANSYS Fluent software. Paraffin wax represents the phase change material (PCM) in this work, while water was selected to be the heat transfer fluid (HTF). The calculations were carried o
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThis research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to