In this research , phthallic anhydride ring is opened with 4-methyl aniline and acetone as a solvent to results the compound [I] that reacted with dimethyl sulphate and anhydrous sodium carbonate formation to phathalate ester [II], while the acid hydrazide compound [III], was obtained from mixed the compound [II]with hydrazine hydrate, Synthesis four type of shiff bases[IV]a-d was synthesized from the reaction of acid hydrazide [III] with aromatic aldehyde or ketone , when reacted Shiff bases with phthalic anhydride or naphthalicanhydride,I get eight derivatives of oxazepine [V]a-d , [VI]a-d. The bacterial activity of the new compounds studied by four species of bacteria: Esherichia Coli, Enterobactecloacae (Gram negative) and staphylococcusaureus, Bacillus subtilis (Gram positive). These compounds were identified by FTIR, 1HNMR and Mass (of some of them).
A group of amino derivatives [4-aminobenzenesulfonamide,4-amino-N¹ methylbenzenesulfonamide, or N¹-(4-aminophenylsulfonyl)acetamide] bound to carboxyl group of mefenamic acid a well known nonsteroidal anti-inflammatory drugs (NSAIDs) were designed and synthesized for evaluation as a potential anti-inflammatory agent. In vivo acute anti-inflammatory activity of the final compounds (9, 10 and 11) was evaluated in rat using egg-white induced edema model of inflammation in a dose equivalent to (7.5mg/Kg) of mefenamic acid. All tested compounds produced a significant reduction in paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, the 4-amino-N-methylbenzenesulfonamide derivative (c
... Show MoreGuanine has a variety of roles in chemistry, from its basic function in the storing and transferring genetic information to its usages in synthetic chemistry and other fields. Because of its distinct structure and biological importance, it is a fundamental component of contemporary study in organic chemistry and molecular biology. In this review, we focused on covering the synthetic pathways of various derivatives of guanine from the year 2000 until the present. As a result of the guanine molecule containing multiple functional groups, this gives us the ability to prepare several guanines such as O6-alkylating guanines, O6-benzylguanines, 8-aza-O6-benzylguanines, 9-substituted guanines, guanine-azo derivatives, guanine Schiff bases, guanin
... Show MorePrecision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us
... Show More
Background: Thyroid operation needs very meticulous haemostasis to have minimal morbidity and mortality.
Objectives: Assessment of harmonic knife in open thyroid surgery as anew haemostatic procedure .
Type of the study: Cross-sectional study.
Methods: This study had been conducted at Alkindy teaching hospital in Baghdad city from the 1st of May 2013 to the 1st of January 2017 on 229 goiterous patients who needs thyroidectomy(36 males,193 females),divided in 2 groups according to the haemostatic procedure used during their operations, Group A (15 males,85females)using the usual conventional surgery(
... Show MoreIn this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets
Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.
An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo
... Show More
Viscosity is one of the most important governing parameters of the fluid flow, either in the porous media or in pipelines. So it is important to use an accurate method to calculate the oil viscosity at various operating conditions. In the literature, several empirical correlations have been proposed for predicting crude oil viscosity. However, these correlations are limited to predict the oil viscosity at specified conditions. In the present work, an extensive experimental data of oil viscosities collected from different samples of Iraqi oil reservoirs was applied to develop a new correlation to calculate the oil viscosity at various operating conditions either for dead, satura
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show More