With the study of synthesizing new organic compounds and exploring biological potency. Aryldiazenyl derivatives (2-5) were carried out by coupling of diazonium salt of 4-aminoacetophenone (1) and miscellaneous active methylene compounds such as: acetylacetone, ethyl cyanoacetate, dimedone or methyl acetoacetate. Moreover substituted 1,2,3-triazole (7-9) were synthesized by the cyclization of 1-(4-azidophenyl) ethanone (6); (which was obtained by coupling of diazonium salt (1) with sodium azid); with acetylacetone, methyl acetoacetate or methyl cyanoacetate, respectively. The structures of the prepared compounds were promoted by IR, H1NMR and UV/Visible spectra. Further, they were examined in vetro for antibacterial activity against five strains of bacteria viz., Staphylococcus aureus, Bacillus subtilis, Pseudomonas aeruginosa, Escherichia coli and Acinetobacter uses the agar diffusion method.
APDBN Rashid, The College of Arts/ Al-Mustansiriyya University, 2004
Thyroid hormones (TH) regulate the metabolic processes required for normal development and growth; also, to organizemetabolism in adults, any defect in thyroid function leads to abnormality in thyroid hormones level. The current study hasbeen designed to find the relationship between retinol-binding protein-4 and progranulin in the serum of Iraqi women withhypothyroidism and hyperthyroidism, also, to study whether these patients are exposed to a risk of developing diabetes mellitus,and PGRN may be a biomarker in detection early stage of diabetes mellitus.Materials and Methods: in this study, serum samples were obtained from 50 Iraqis women patients, [25 patients withhypothyroidism (G2) and 25 patients with hyperthyroidism (G3)] in addition
... Show MoreIn this work, a local sunflower husk (SFH) was used as a natural surface for removing Basic Green-4 (BG4) dye, as a watersoluble pollutant. The effect of initial concentration, contact time, the mass of surface of the dye with the SFH as well as the medium temperature was studied. The application of Langmuir, Freundlich isotherms on the collected data of the adsorption process found to harmonize to Freundlich equation more than that of Langmuir. However, the adsorbed mass of BG4 dye showed a direct increase with the increase of SFH mass and equilibrium was achieved within a 60min window. The interaction of BG4 with SFH surface was spontaneous and exothermic. The empirical kinetic outcomes at ambient temperatures were applied to pseudo 1st a
... Show MoreThe molluscicidal effects of herbicide 2, 4-D were studied against tow species of freshwater snail Bulinus truncatus and Melanopsis nodosa by short term experiments. Calculated values of lethal concentrations (LC50 and LC100) were maid to two spices for different period of time 24hr, 48hr, 72hr and 96hr. The study had showed that the herbicide 2, 4-D was toxic against the tow species. The toxicity of the herbicide was low or unknown in low concentrations in the first period of exposure 24and 48hr to two spices but it increase gradually with increase period of exposure. The spice of B.truncatus was more tolerant than the M.nodosa. All the individual of M nodosa was death while in B.truncatus the complete death was not appear until finish the
... Show MoreThis paper describes the development of a simple spectrophotometric determination of bismuth III with 4-(2-pyridylazo) resorcinol (PAR) in aqueous solution in the presence of cetypyridinium chloride surfactant at pH 5 which exhibits maximum absorption at 532 nm. Beer's law is obeyed over the range 5-200 µg/25 mL. i.e. 0.2-8 ppm with a molar absorptivity of 3×104 l.mol-1.cm-1 and Sandell's sensitivity index of 0.0069 µg.cm-2. The method has been applied successfully in the determination of Bi (III) in waters and veterinary preparation.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe radial wave functions of the generalise dWoods–Saxon (GWS) potential within the two-body model of (Core + n) have been used to study the ground-state density distributions of protons, neutrons and matter and the associated root mean square (rms) radii of neutron-rich 14B, 22N, 23O and 24F halo nuclei. The calculated results show that the radial wave functions of the generalised Woods–Saxon potential within the two-body model succeed in reproducing neutron halo in these exotic nuclei. Elastic electron scattering form factors for these nuclei are studied by combining the charge density distributions with the plane-wave Born approximation (PWBA).