The target of this study was to synthesize several new Ciprofloxacin drug analogs by providing a nucleophilic substitution procedure that provides new functionality at the carboxylic group location. The analogs were synthesized, designed, and characterized by 1HNMR, and FTIR. The synthetic path began from the reaction of ciprofloxacin drug with morpholine to give compound[B], ciprofloxacin derivative was linked with a variety of primary and secondary amines to give compounds[B1-B9]. The above-mentioned prepared compounds [B3 and B5] were applied to liver enzymes, and the increase in the activity of these enzymes was observed. In addition, a theoretical study was conducted to study the energies and properties of the prepared compounds.
Purpose: studying and analyzing the nature of uncertainty as part of strategy formulation, through analyzing the uncertainty faced by managers in the modern business environment characterized by high complexity and dynamism, though developing of an idea about the uncertainty cases and how enable the mind to understand these cases.
Methodology: It was the use of inductive and analytical approach, in order to study the accumulation of knowledge towards development areas that could contribute to strengthening the strategy formulation.
Findings: Mentoring the future will not make the success for business organization but thought business organization ability to developing share mental
... Show MoreCarbonate-clastic succession which includes the Shu'aiba, Nahr Umr and Mauddud formations are representing a part of the Barremian-Aptian Sequence (Wasi'a Group). The present study includes three boreholes (Ba-1, 4 and 8) within the Balad Oil Field. The study area is located in central Iraq. This field represents a subsurface anticline with a northwest to southeast direction axis within the Mesopotamian Zone. Eight types of microfacies were recognized in the succession of the Mauddud and Shu’aiba formations. These microfacies represent shallow open marine, restricted and semi-restricted, reef - back reef, deep open marine and basinal depositional environments. While Nahr Umr Formation includes two successions, the first is the upp
... Show MorePoetry is regarded an interesting area of inquiry in linguistic studies due to its eccentric and aesthetic use of language. A lot of studies have been carried out so far for the analysis of poetry, yet few have dealt with pastoral poetry. The present research attempts to investigate the language of pastoral poetry in two different languages i.e. English and Arabic with the aim of finding similarities and differences. The data of the study consists of one English and one Arabic pastoral poems. Leech and Short's (2007) checklist is used as a model for analysis. The findings of the study reveal that there are more similarities than differences between English and Arabic pastoral poems as the poems rely on contrast in the use of the lex
... Show MorePoetry is regarded an interesting area of inquiry in linguistic studies due to its eccentric and aesthetic use of language. A lot of studies have been carried out so far for the analysis of poetry, yet few have dealt with pastoral poetry. The present research attempts to investigate the language of pastoral poetry in two different languages i.e. English and Arabic with the aim of finding similarities and differences. The data of the study consists of one English and one Arabic pastoral poems. Leech and Short's (2007) checklist is used as a model for analysis. The findings of the study reveal that there are more similarities than differences between English and Arabic pastoral poems as the poems rely on contrast
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreAbstract
The present investigation aimed to formulate a liquid self-microemulsifying drug delivery system (SMEDDS) of tacrolimus to enhance its oral bioavailability by improving its dispersibility and dissolution rate. Four liquid SMEDDS were prepared using maisine CC as oil phase, labrasol ALF as surfactant and transcutol HP as co-surfactant based on the solubility studies of tacrolimus in these components. The phase behavior of the components and the area of microemulsion were evaluated using pseudoternary phase diagrams. The formulations were also assessed for thermodynamic stability, robustness to dilution, self-emulsification time, drug content, globule size and polydispersity index. The prepared SMEDDS formulations exhibi
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreUse of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More