Tannin acyl hydrolase as the common name of tannase is an inducible extracellular enzyme that causes the hydrolysis of galloyl ester and depside bonds in tannins, yielding gallic acid and glucose. The main objective of this study is to find a novel gallic acid and tannase produced by
Objective: Hesperidin (HSP) is a pharmacologically active organic compound found in citrus fruits and peppermint. We synthesized a new HSP derivative by reacting it with 5-Amino-1,3,4-thiadiazole-2-thiol in acetic acid. Methods: This compound was characterized by Fourier-transform infrared, proton nuclear magnetic resonance, and electron impact mass spectra. A molecular docking study explores the predicted binding of the compound and its possible mode of action. Bioavailability, site of absorption, drug mimic, and topological polar surface was predicted using absorption, distribution, metabolism, and excretion (ADME) studies. Results: The docking study predicts that the new compound binds to the active sites of Aurora-B
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreCopper (I) complex containing folic acid ligand was prepared and characterized on the basis of metal analyses, UV-VIS, FTIR spectroscopies and magnetic susceptibility. The density functional theory (DFT) as molecular modeling calculations was used to determine the donor atoms of folic acid ligand which appear clearly at oxygen atoms binding to hydrogen. Detection of donation sights is supported by theoretical parameters such as geometry, mulliken population, mulliken charge and HOMO-LUMO gap obtained by DFT calculations.
Improving in assembling technology has provided machines of higher evaluation with better resistances and managed behavior. This machinery led to remarkably higher dynamic forces and therefore higher stresses. In this paper, a dynamic investigation of rectangular machine diesel and gas engines foundation at the top surface of one-layer dry sand with various states (i.e., loose, medium and dense) was carried out. The dynamic investigation is performed numerically by utilizing limited component programming, PLAXIS 3D. The soil is accepted as flexible totally plastic material submits to Mohr-Coulomb yield basis. A harmonic load is applied at the foundation with amplitude of 10 kPa at a frequency of (10, 15 and 20) HZ and se
... Show MoreThis Paper aims to plan the production of the electrical distribution converter (400 KV/11) for one month at Diyala Public Company and with more than one goal for the decision-maker in a fuzzy environment. The fuzzy demand was forecasting using the fuzzy time series model. The fuzzy lead time for raw materials involved in the production of the electrical distribution converter (400 KV/11) was addressed using the fuzzy inference matrix through the application of the matrix in Matlab, and since the decision-maker has more than one goal, so a mathematical model of goal programming was create, which aims to achieve two goals, the first is to reduce the total production costs of the electrical distribution converter (400 KV/11) and th
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More