Various nutritional solutions given to patients contain amino acids. Possible interference of this supplementation with selected aminoglycoside antiboiotics, namely gentamycin and streptomycin was evaluated in vitro. In minimal medium, E.coli was inhibited by gentamycin and by streptomycin. Circumvention of this inhibition was obtained with a mixture of 20 amino acids in the medium. Deletion of amino acids revealved that circumvention. specific amino acids were required for such Deletion of the aromatic amino acids or cysteine abolished the protection against gentamycin and streptomycin, while the deletion of the branched chain amino acids abolished the protection against streptomycin only. Thereonine, on the other hand, appears to be essential for the protection against gentamycin toxicity to E.coli. These results suggest that specific amino acids interfere with gentamycin and streptomycin toxicity to E.coli
The experiment was carried out with the aim of studying the effect of biological stress on some morphological parameters of ten varieties of potatoes grown in vitro. Biological stress was applied by adding different concentrations of fusaric acid (0, 0.0125, 0.025, 0.05, 0.1, 0.2 mM), to the growth medium MS, and some growth parameters were measured, such as plant height (cm), number of leaves (leaf/plant¹), leaf area (mm²), number of roots (root.plant¹) and length it (cm), wet and dry weight of the plant (g). The results showed that the studied varieties were different in the response to biological stress according to the studied parameters. The addition of fusaric acid led to reduce all growth parameters compared with the
... Show MoreBackground: Antioxidant, sedative, anticancer, and antibacterial properties are among the numerous pharmacological characteristics of Galium verum. Aim: The primary goal of this research was to investigate the therapeutic effects of G. verum extract against folic acid-induced acute kidney injury (AKI). Materials and methods: 18 male rats were assigned into three groups: Control, AKI, and G. verum. AKI was induced by a dose of folic acid (250 mg/kg, i.p.) while G. verum (250 mg/kg) was administrated for 7 consecutive days. Results: G. verum methanol extract contains flavonoids, anthraquinones, tannins, iridoids, triterpen
... Show MoreThis research involved synthesis of new β-Lactam derivative from Azo compound[4-amino-N-(pyrimidine-2-yl)-3-(pyrimidine-2-yldiazenyl) benzene sulfonamide] (S1) record previously by many steps. Starting conversion the free amino group in an azo comp. to chloro acetamide derivative(S2), then reacted it with urea to give the oxazole ring derivative (S3) that which containing free amino group. The condensation reaction between the amino group and P-bromobenzaldehyde to produce Shiff base (B14). Finally staudinger's cyclo addition reaction go run between the Shiff base derivative (B14) and chloro acetyl chloride in the presence of tri ethyl amine (Et3N) as Base catalyst and dioxane a
... Show MoreThe purpose of the paper is to tind the degree of the approximation of a functions f be bounded , measurable and defined
in interval [a,h]by Bernstein polynomial in LP space 1 $ p < oo by
using Ditzian-Totik modulus of smootlmess and k 1n average modvlus of smoothness.
The importance of this research is due to its importance goals, Which are about the attempt of researchers to investigate the probability of depending on businesses, environments to transform organizations, performance in away that enhance the leading role of organizations in their environments , and through views of a number of the staff working in the foundation of technical institutes in Mosul. .
After deciding the methodology of the study that ,in one hand ,performs the goals of the study , and achieving a suitable theoretical framework to present the concepts of businesses, environments and the leadin
... Show MoreThe corrosion behavior of low carbon steel in washing water of crude oil solution has been studied potentiostatically at five temperatures in the range (30–70)°C .The corrosion potential shifted to more negative values with increasing temperature and the corrosion current density increased with increasing temperature. Folic acid had on inhibiting effect on the corrosion of low carbon steel in washing water at a concentration (5× 10-4-- 5× 10-3 ) mol/dm3 over the temperature range (30–70)°C. Values of the protection efficiency were calculated from the corrosion current density .From the general results for this study, it can be seen that thermodynamic and kinetic function were also calculated (?G, ?S, ?H and Ea )
... Show MoreAudio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show MoreThe poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More