New Fourteen compounds were synthesized in four steps. The first step included synthesis of 2-biphenyl fused ring of imidazo(1,2- a)pyrimidine from the reaction of 2-aminopyrimidine and biphenyl phenacyl bromide . The second step was introduced aldehyde group from the reaction of 2-biphenyl fused rings of imidazo(1,2-a)pyrimidine with POCl3 in presence of DMF and CHCl3. 3-Carbaladehyde derivatives of fused imidazo/pyrimidine was reacted with different aromatic amines to afford new Schiff bases. These new 3- imines derivatives was reduced by using sodiumborohydride to yield another new 3-aminomethyl-2-biphenyl imidazo (1,2-a)pyrimidine derivatives in moderate yield .Some new prepared compounds were identified by melting point, FT- IR , 13C-NMR and 1H-NMR spectra. Most of the new products compounds were tested against different bacteria to evaluate them as antimicrobial agents.
Ultraviolet spectrophotometric studies for antibiotic (amino glycoside) derivatives including, Neomycin, Streptomycin, Gentamycin and Kanamycin with special reagents, which are benzoyl chloride; benzene sulfonyl chloride, toluenesulfonyl chloride and phthalic anhydride were made. Amino glycosides derivatives were followed through measurements of the ultraviolet absorbance (A) from which the absorptivity (ε) of the complexes was deduced and molar absorbances using Ultraviolet for products and calculate the number of reagents molecule that combine to amino glycosides.
The synthesis and bioactivity of zinc oxide nanoparticles has been extensively studied. The antibacterial activity of different antibiotics individually (ceftriaxone (C), chloramphenicol (CRO), penicillin (P) and amoxicillin (Ax)) and Zinc oxide nanoparticles (60μg/ml) in combination with the previously mentioned antibiotics has been demonstrated in the present study by using the disk diffusion assay method. The results showed a synergistic effect between Zinc oxide nanoparticles (ZnO NPs) and both Ax and P for most of the studied Gram-positive isolates (Staphylococcus aureus1, Staphylococcus aureus2, Staphylococcus epidermidis1, Staphylococcus epidermidis2, Enterococcus faecalis1, Enterococcus faecalis2 ) and between ZnO NPs and both C
... Show MoreThe present work shows a theoretical results that have been used the functional Hybrid of three parameters Lee-Yang-Parr (B3LYP) of the quantum mechanical approach for density functional theory with (Spanish Initiative for Electronic Simulations with Thousands of Atoms) SIESTA code. All calculations were carried out employing the used method at the Gaussian 09 package of programs. It was reported the main point for research on dominance of the bandgap of elongated pi-conjugated molecules by using different chemical groups replacing hydrogen atom in the most molecules that used in this work. The side groups creates another factor that controls the value of the band gap. The dihedral angle between the two pheny
... Show MoreBackground: Lack of durability of the bond of the dental adhesive systems to tooth structure is one of the most important problems in tooth colored restorative work. This in vitro study was performed to evaluate the effect of 2% chlorhexidine gluconate(CHX) on dentin bond strength by using total etch adhesive system at twenty-four hours and three months of water storage. Material and methods:A flat dentin surface was prepared for forty sound human maxillary premolar teeth which were acid etched with 36% phosphoric acid gel after being divided randomly into four groups of ten teeth each according to storage time and CHX application, theCHX was applied for 60 seconds before adhesive application for groups I and III which were tested after twe
... Show MoreRwanga (view) movement is a new Kurdish poetry movement. Some poets and modern storywriters published a manifest in 1970. They have made a group of changes in the content and appearance of Kurdish poetry. They were under the influence of western literature schools such as Surrealism, Dadaism and Existentialism. Likewise, the impact of the new Arabic literature that appeared by the end of 1960s on them was obvious as they were imitating such literatures. Nevertheless, the condition of Kurdistan at that time was in need of a new literature to express that new stage. Sherko Bekas was one of those poets who became the dynamo of the poetic movement in which the rebellion spirit was embodied in the modern way of dealing with culture, rhyme, rh
... Show MoreGreen synthesis methods have emerged as favorable techniques for the synthesis of nano-oxides due to their simplicity, cost-effectiveness, eco-friendliness, and non-toxicity. In this study, Nickel oxide nanoparticles (NiO-NPs) were synthesized using the aqueous extract of Laurus nobilis leaves as a natural capping agent. The synthesized NiO-NPs were employed as an adsorbent for the removal of Biebrich Scarlet (BS) dye from aqueous solution using adsorption technique. Comprehensive characterization of NiO-NPs was performed using various techniques such as atomic force microscopy (AFM), Fourier transform infrared (FTIR), X-ray diffraction (XRD), Brunauer-Emmett and Teller (BET) analysis, and scanning electron microscopy (SEM). Additionally, o
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More