Phthalimide formation of Phthalic anhydride with various amines using microwave or without a method with the difference of the catalyst used in a prepared Phthalimide, either structure general are C6H4CONRCO and used as starting materials in synthesis several compounds derivative phthalimides are an important compounds because spectrum wide biological activities including Antimicrobial activity, anticonvulsant activity, Anti-inflammatory activity,Analgesic activity, Anti- influenza activity and Thromboxane inhibitory activity
In the present paper we report the synthesis of a new ligand [HL][(2-1-[(2-hydroxy-benzylidene)-hydrazono]-ethyl) benzene-1, 3, 5-triol and its complexes with (Mn", Fe", Cd", and Hg") The ligand was prepared in two steps. In the first step a solution of salicylaldehyed in methanol reacted under reflux with hydrazinemonohydrate to give an intermediate compound which reacted in the second step with 2, 4, 6-trihydroxidernonohydrate giving the tientioned ligand. The complexes were synthesis by direct reaction of the corresponding metal chloride with ligand. The ligand and the complexes have been characterized by spectroscopic methods [" H NMR, IR, UV-Vis,, atomic absorption], HPLC microanalysis along with conductivity measurements. From the abo
... Show MoreIn contrast to the classical antibacterial sulfa drugs that are unsubstituted or monosubstituted, our newly synthesized analogs were designed to obtain sulfonamide moiety containing disubstituted hetero nitrogen atom. These compounds were formed successfully by chlorosulfonation of acetanilide and the product was treated with different cyclic amines and finally amide hydrolysis was necessary to get agents that were analyzed for IR, UV, CHN, melting points and solubility. At last, we studied their antibacterial activity on certain types of bacteria and we noticed the inactivity due to possible steric factor. Principly, this means these products have no inhibiting action against the used microbes.
Worldwide attention is being focused on nanocrystalline zeolites and they are replacing conventional ones due to their pronounced potential in many fields. In this study, NaY zeolite has been prepared hydrothermally using sol –gel method and modified to the proton type by ion –exchange process. Characterization is made using X-ray diffraction (XRD), thermogravimetric analysis (TGA), Fourier transform infrared spectroscopy (FTIR), Atomic force microscopy (AFM), Brunauer –Emmet- Teller (BET) nitrogen adsorption method, Ammonia Temperature programmed desorption (NH3-TPD) and Scanning electron microscopy( SEM). The effect of aging time, silica to alumina ratio is studied and the results sh
... Show MoreABSTRACT
This research included the preparation and characterization of new demulsifies from natural and synthetic polymers of chitosan and polyvinyl alcohol that are environmentally friendly and at the same time have high efficacy comparable to emulsifiers. imported foreign. The prepared compounds were examined using infrared spectroscopy and nuclear magnetic resonance spectroscopy, and all the spectral signals of the polymers were in good agreement with the chemical composition of the polymers. And the melting and decomposition that occur on polymers at high temperatures. The effect of the length and type of side chain in the compositions of polymers on the process of water separation of oil emulsions w
... Show MoreBiological drugs have an active substance that is made by a living organism or derived from a living organism. They are one of the important therapy options used in a wide range of diseases especially life-threatening diseases. Biological therapy opens new opportunities for treating different diseases for which drug therapy is minimal, but they have considerable differences in the safety consequences in comparison with non-biological drugs. The aim of the current study was to assess the post-marketing safety profile of biological drugs used in Iraqi hospitals by the analysis of the reported adverse drug reactions regarding their severity, seriousness, preventability, expectedness, and outcome. It is a retrospective study of the individu
... Show Moreole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with
... Show Moreole in all sta
Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and flui
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show More