Morphological and phonological studies of fungal pathogen infecting alfalfa weevil Hypera postica (Gyllenhal) indicating that infection has been shown to develop along two distinct physiological lines, each culminating in the production of either conidial or resting spores, in host cadavers which are morphologically distinct. The percent of infection and epizootic development appeared to be dependent on host density. Farther evidence to entail proper correlation between conidia and resting spores suggest that these two forms of spores are stages in the development of one pathogen.
This research investigates new glasses which are best suitable for design of optical systems
working in the infrared region between 1.01 to 2.3μm. This work is extended to Oliva & Gennari
(1995,1998) research in which they found that the best known achromatic pairs are (BAF2-IRG2; SRF2-
IRG3; BAF2-IRG7; CAF2-IRGN6; BAF2-SF56A and BAF2-SF6). Schott will most probably stop the
production of these very little used and commercially uninteresting IRG glasses. In this work equally
good performances can be obtained by coupling BAF2, SRF2&CAF2 with standard glasses from Schott
or Ohara Company. The best new achromatic pairs found are (SRF2-S-TIH10; CAF2-S-LAL9; CAF2-SLAL13
and CAF2-S-BAH27). These new achromatic pai
Five new ceftazidime derivatives were designed and synthesized in an attempt to improve the acid stability and may increase the spectrum of ceftazidime. The synthesized compounds included; Schiff base of ceftazidime (compound 1), ceftazidime lysine amide Schiff base (compound 2), ceftazidime lysine amide (compound 3), ceftazidime-di-lysine amide Schiff base (compound 4) and ceftazidime-di-lysine amide (compound 5). New ceftazidime derivatives were successfully prepared characterized and identified using spectral and elemental microanalysis (CHNS) analyses and the results comply with the calculated measurements.
Compounds 1 and 2 were subjected to a stability study in phosphate buffer (0.2M, pH 7.4) and in KCl/HCl buffer (0.
... Show MoreAugust Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreIn-vitro biological activities of the free new H4L ( indole-7-thiocarbohydrazone) ligand and its Ni(II), Pd(II) , Pt(II), Cu(II), Ag(I), Zn(II) and Cd(II) complexes are screened against two cancerous cell lines, that revealed significant activity only for [Cu2Cl2(H4L)2(PPh3)2] after 72 h treatment by the highest tested concentrations. The Copper(I) complex was characterized by X-ray Crystallography and the NMR spectra, whereas it has been confirmed to have momentous cytotoxicity against ovarian, breast cancerous cell lines (Caov-3, MCF-7). The apoptosis-inducing properties of the Cu(I) complex have been investigated through fluorescence microscopy visualization, DNA fragmentation analysis and propidium iodide flow cytometry.
Based on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.
In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.