The derivatives formed after the successive acetylation, esterification and nitration reactions to cholic, deoxycholic, and taurocholic acids were identified to be of the following general strucure: Colt, Where RI=NO3, OH, 0=, or CH3COO. R2=H, NO3, OH, 0-=, or CH3COO. R3=H, NO3,01-1, 0=, or CH3COO. R4=OH, NH(CH2)2S03Na, NH(CH2)2S03H, or OMe. By using U.V-visible and I.R spectrophotometry . The number of hydroxyl groups was determined, purity was checked from T.L.C, Most of these derivatives will find pharmaceutical application.
Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad
... Show MoreThe objective of this experiment was to determine the effects of dietary supplementation with different fat sources on blood parameters of Japanese quail (Coturnix coturnix japonica). Eighty four 7-week old laying quail were randomly assigned to 4 treatment groups (21 birds per group) with 3 replicates for each treatment group and fed for three months on a commercial diet supplemented with 3% of either sunflower oil (T1), flax oil (T2), corn oil (T3) or fish oil (T4). The birds received water and feed ad libitum during the experiment. During the last month of experiment blood samples were collected fortnightly from each bird. The first blood samples collection was used to determine fresh blood parameters, while the second blood samples coll
... Show MoreIsatin (1H-indole-2, 3-dione) and its analogs are an important class of heterocyclic compounds. N-benzyl isatins and Schiff bases of isatin analogs have been reported to demonstrate a variety of biological activities. This work illustrates the synthesis of new N-benzylisatin Schiff bases and studies their biological activity. Firstly, Isatin and its analogs; 5-methoxyisatin, 5-fluoroisatin reacted with benzyl iodide to obtain N-benzylated derivatives of isatins 2 (ac). Secondly, these compounds were reacted with different amines (sulphanilamide and 4-methyl sulphonyl aniline) separately, to obtain Schiff bases compounds 3 (ac) and 4 (ac), respectively. The synthesized compounds were characterized by using FT-IR and 1HNMR spectroscopy. The s
... Show MoreBackground: Chemotherapeutic medication treatment for cancer is typically used in conjunction with other techniques as part of a routine regimen. It is well established that the capacity of different chemotherapeutic drugs to induce apoptosis is correlated with their anticancer efficacy. Quinazolinone-based drugs have demonstrated excellent responses from several cancer cell types. These substances have a lot of potential for use as building blocks in the creation of apoptosis inducers. Objective: To assess the new quinazolinone derivatives (M1 and M2) that were recently synthesized for their potential to halt wound healing and to use the acridine orange/propidium iodide (AO/PI) double stain to assess their capacity to induce apopto
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MorePhytomedicine refers to the use of naturally derived products to cure and mitigate human conditions. Natural products have the advantages of causing minimum side effects, being biocompatible, available, and economical, with a wide array of biological activities. Reports have described the use of natural products with antimicrobial and anti-inflammatory properties to treat oral conditions and promote wound healing. Moringa oleifera, known as the “drumstick” or “horseradish” tree, is believed to have medicinal properties regarding a range of medical conditions, though there is limited information on its use in oral medicine. This narrative review focuses on the use of Moringa extracts in the management of oral conditions, incl
... Show MoreInformation hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show More
