In this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
Background: Diabetes mellitus is a major risk factor for chronic periodontitis (CP) and hyperglycemia has an important role in the enhancement of the severity of the periodontitis. It has been reported that the progression of CP causes shifting of the balance between bone formation and resorption toward osteoclastic resorption, and this will lead to the release of collagenous bone breakdown products into the local tissues and the systemic circulation. Cross-linked N-telopeptide of type I collagen (NTx) is the amino-terminal peptides of type I collagen which is released during the process of bone resorption. This study was conducted to determine the effects of nonsurgical periodontal therapy on serum level of NTx in type 2 diabetic patients
... Show MoreAddition chloro acetyl isothiocyanate (C3H2ClNOS) with 3-Aminoaceto phenone (C8H9NO) to prepare a fresh Ligand [N-(3-acetyl phenyl carbamothioyl)-2-chloroacetamide](L). The ligand (L) behaves as bidentate coordinating through O and S donor with metal ions, the general formula of all complexes [M(L)2(Cl)2](M+2 = Manganese(II), Cobalt(II), Cadmium(II) and Mercury(II)). Compounds were investigation by Proton-1, Carbon -13 NMR spectra (ligand (L) only), Element Microanalysis for C, N, H, O, S, Fourier-transform infrared, UV visible, Conductance
Neoechinorhynchus iraqensis sp. n.(Acanthocephala: Neoechinorhynchidae) from the Freshwater Mullet, Liza abu.
A
A new series of bases of Schiff (H2-H4) derived from phthalic anhydrideweresynthesized. These Schiff bases were prepared by the reaction of different amines (tyrosine methyl ester, phenylalanine methyl ester, and isoniazid) with the phthalimide derived aldehyde with the aid of glacial acetic acid or triethylamine ascatalysts. All the synthesized compounds were characterized by (FT-IR and 1HNMR) analyses and were in vitro evaluated for their antimicrobial activity against six various kinds of microorganisms. All the synthesized compounds had been screened for their antimicrobial activity against two Gram-positive bacteria “Staph. Aureus, and Bacillus subtilis
... Show MoreBackground: Lung cancer is a common disease for patients over the age of 50 years, especially males due to smoking habits. This study aimed to compare the modulation complexity score (MCS) for the advanced treatment planning techniques which the intensity modulated radiation therapy (IMRT) and volumetric modulated arc therapy (VMAT). Materials and Methods: Thirty patients who had non-small lung cancerous tumors on their left side participated in this study. The range ages were 68 to 98 years, the heights were between 151 and 182cm and they having weights from 46 to 79 kg. For Each patient will create two plans dial using two different techniques, which will be Intensity Modulated Radiation Therapy (IMRT) and Volumetric Modulated Arc Therapy
... Show MoreFluid-structure interaction method is performed to predict the dynamic characteristics of axial fan system. A fluid-structure interface physical environment method (monolithic method) is used to couple the fluid flow solver with the structural solver. The integration of the three-dimensional Navier-Stokes equations is performed in the time Doman, simultaneously to the integration of the three dimensional structural model. The aerodynamic loads are transfer from the flow to structure and the coupling step is repeated within each time step, until the flow solution and the structural solution have converged to yield a coupled solution of the aeroelastic set of equations. Finite element method is applied to solve numerically
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show More