This review covers recent progress in the synthesis of curcumin and the bioactivity of semisynthetic and synthetic analogs of curcumin. The review also shows how curcumin is a useful intermediate for the synthesis of more complex organic molecules; historical perspective; the process of preparing the metal complexes and characterization the produced complexes using various spectral and other techniques; shows the importance of curcumin and its derivatives for their potential applications in medical devices and broad-spectrum of medical application such as antibiotic ointment, alternative therapeutics, antifungal, and antibacterial activities
he public federal budget of the state includes estimated figures for state revenues and expenditures for the next fiscal year. The estimation process is one of the main parts of the preparation of the general budget of the state and the accuracy in the estimation of revenues and expenditures of the most important principles that should be based on the process of making estimates and should not overestimate the assessment process to ensure the availability of funds in the future in all cases, which lead to unfair distribution of allocations, so the research aims to study The case of preparing the budget in the Directorate and how to estimate the expenditure in, by the analysis of operating budgets and identify deviations in the implementa
... Show MoreRegression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh
... Show MoreKE Sharquie, AA Noaimi, AR Bandar, SY Mohsin, Pigmentary Disorders, 2014 - Cited by 5
A digital elevation model (DEM) is a digital representation of ground surface topography or terrain. It can be represented as a raster (a grid of squares) and it is commonly estimated by utilizing remote sensing techniques, or from land surveying. In this research a 3D building of Baghdad university campus have been performed using DEM, where the easting, northing, and elevation of 400 locations have been obtained by field survey using global positioning system (GPS). The image of the investigated area has been extracted from QuickBird satellite sensor (with spatial resolution of 0.6 m). This image has been geo-referenced by selecting ground control points of the GPS. The rectification is running, using 1st order polynomial transformation.
... Show MoreThe ethyl acetate synthesis via heterogeneous reactive distillation is studied experimentally using ethanol and acetic acid. Three types of cation exchanging resins were used as catalysts: Zerolit 225, Zerolit 226 and Ambylite 400. Experiments were carried out in two units of the same dimensions. Each unit consisted of three sections: rectifying, reactive and stripping sections of heights (60+25+20) cm respectively and 2.5cm column diameter. The first unit (column-A-) was a fractionation type and the second unit (column-B-) was packed column. The packing type was hollow glass cylinders with 10 mm height, and 4, 5 mm inner and outer diameter respectively.
The experiment
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show More