Imagination as a Path to Reality
A series of Schiff base-bearing salicylaldehyde moiety compounds (1-4) had been designed, synthesized, subjected to insilico ADMET prediction, molecular docking, characterization by FT-IR, and CHNS analysis techniques, and finally to their Anti-inflammatory profile using cyclooxygenase fluorescence inhibitor screening assay methods along with standard drugs, celecoxib, and diclofenac. The ADMET studies were used to predict which compounds would be suitable for oral administration, as well as absorption sites, bioavailability, TPSA, and drug likeness. According to the results of ADME data, all of the produced chemicals can be absorbed through the GIT and have passed Lipinski’s rule of five. Through molecular docking with PyRx 0.8, these
... Show MoreMicrofibers released by synthetic clothes have a significant negative effect on the environment. Several solutions have been proposed and evaluated for their effectiveness, but studies have failed to address the human-centered aspects of these products. In this research, the possibilities and needs from a consumer perspective for a new filtering system for domestic washing machines were examined. First, a quantitative (questionnaire) and a qualitative (interviews and observations) exploration were done to understand the desired requirements from a user perspective. Next, the acceptance of various existing solutions for microfiber catching was investigated. To verify these requirements, a new concept was designed and evaluated with a
... Show MoreThe current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name
... Show MoreThis study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More