In study of effective bioactive compounds, we have synthesized the Co((ІІ), Mn(ІІ), Fe(ІІ), Cu(ІІ), Ni(ІІ), and Zn(ІІ) complexes of the Schiff base derived from trimethoprim and2'-amino-4-chlorobenzophenone and characterized by spectroscopic (NMR, IR, Mass, UV–vis,), analytical, TGA studies and magnetic data .The solution electronic spectral study suggests the stoichiometry of the synthesized complexes and Elemental analysis detected the square planer and octahedral geometry of the compounds. The prepared metal complexes presented promoted efficiency versus the screened bacterial (Escherichia Coli and Staphylococcus aureus) antibacterial efficacy against (Staphylococcus aureus, Salmonella spp., E. coli, Vibrio spp., Pseud
... Show MoreNonalcoholic fatty liver disease (NAFLD) is a common liver disease that ranges from simple steatosis to nonalcoholic steatohepatitis (NASH). So far, the underlying mechanism remains poorly understood. Here, we show that hepatic carboxylesterase 2 (CES2) is markedly reduced in NASH patients, diabetic
Two series of Schiff Bases [VI]n and thiazolidin-4-one derivatives[VII]n were synthesized by many steps starting from cyclization of 4- hydroxyacetophenon with thiourea in iodine to yield 1,3-thiazole compound which was reacted with pentoxy bromide in anhydrous potassium carbonate to converted compound[II] and this reacted with Phenol to yield azo compound[III]. The azo compound reacted with ethyl chloro acetate in basic medium to get a new easter compound[IV] which is converted to their acid hydrazid[V]. The later compound condensation with n-alkoxy benzaldehyde to give new Schiff bases[VI]n . Imine group undergoes addition cyclization with thioglycolic acid to get thiazolidinone compounds[VII]n .Also, two new series of Schiff Bases [XII]n
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreAbstract:
The internal audit is considered the safety valve for senior management in all institutions. It aims to protect property, and raise the efficiency and effectiveness of the administrative performance, by following up on compliance with laws and instructions and the application of regulations in a way that increases the administrative performance of the department. The internal audit is possible to determine Weaknesses or imbalances in the administrative performance. To achieve this goal, an analytical descriptive methodology was adopted. The Baghdad Health Department / Al-Rosana was considered as society for this s
... Show MoreIn this paper, we deal with the problem of general matching of two images one of them has experienced geometrical transformations, to find the correspondence between two images. We develop the invariant moments for traditional techniques (moments of inertia) with new approach to enhance the performance for these methods. We test various projections directional moments, to extract the difference between Block Distance Moment (BDM) and evaluate their reliability. Three adaptive strategies are shown for projections directional moments, that are raster (vertical and horizontal) projection, Fan-Bean projection and new projection procedure that is the square projection method. Our paper started with the description of a new algorithm that is low
... Show More