A new series of 5-methoxy-2-mercapto benzimidazole derivatives were synthesized by the reaction of 5-methoxy- 2-mercaptobenzimidazole with chloroacetic acid and affords 2-((5-methoxy-1H-benzo[d]imidazol-2-yl)thio) acetic acid (1),which on cyclization with acetic anhydride and pyridine gives 7- methoxybenzo[4,5]imidazo[2,1-b]thiazol- 3(2H)-one(2), which on condensation with different aryl aldehydes in the presence of anhydrous sodium acetate in glacial acetic acid, furnishes a arylidene thiazolidinone. The purity of the synthesized compounds was confirmed by melting point and TLC.The structures were established by different spectral analysis such as FTIR,1HNMR, and CHN analysis. The newly synthesized compounds (3a-d) were in vivo evaluated for their anticonvulsant activity against yohimbine hydrochloride- induced epilepsy in comparison with 2mg/kg diazepam as a reference drug. The anticonvulsant effect of the intended compounds was assessed by their ability to delay the onset of seizure attack and by a reduction in the number of attacks. All of the synthesized compounds were found to have anticonvulsant activity.
Galantamine was isolated from the bulb part of Narcissus jonquilla L. plant cultivated in Iraq. The compound was identified by different chemical analysis like: Fourier Transforms Infrared spectra (FTIR), High Performance Liquid Chromatography (HPLC) and mass spectroscopy and 1H-NMR.
The porosity of materials is important in many applications, products and processes, such as electrochemical devices (electrodes, separator, active components in batteries), porous thin film, ceramics, soils, construction materials, ..etc. This can be characterized in many different methods, and the most important methods for industrial purposes are the N2 gas adsorption and mercury porosimetry. In the present paper, both of these techniques have been used to characterize some of Iraqi natural raw materials deposits. These are Glass Sand, Standard Sand, Flint Clay and Bentonite. Data from both analyses on the different types of natural raw materials deposits are critically examined and discussed. The results of specific surface are
... Show MoreThe purpose of this research was to prepare, characterize, and evaluate the new antimicrobial peptide KSL peptide encapsulated in poly(D,L-lactide-co-glycolide) (PLGA)composite microspheres. KSL was loaded in poly(acryloyl hydroxyethyl) starch (acHES) micropar-ticles, and then the peptide-containing microparticles were encapsulated in the PLGA matrix by a solvent extraction /evaporation method.
KSL-loaded PLGA microspheres were also prepared without the starch hydrogel microparticle microspheres for comparison study. KSL peptide microspheres were characterized for drug content, surface morphology, microspheres size determination, polymers stability , in vitro microspheres degradation and in vitro release. KSL peptide
... Show MoreObjective: The objective of the present study was to design and optimize oral fast dissolving film (OFDF) of practically insoluble drug lafutidine in order to enhance bioavailability and patient compliance especially for a geriatric and unconscious patient who are suffering from difficulty in swallowing.Methods: The films were prepared by a solvent casting method using low-grade hydroxyl propyl methyl cellulose (HPMC E5), polyvinyl alcohol (PVA), and sodium carboxymethyl cellulose (SCMC) as film forming polymers. Polyethylene glycol 400 (PEG400), propylene glycol (PG) and glycerin were used as a plasticizer to enhance the film forming properties of the polymer. Tween 80 (1% solution) and poloxamer407 were used as a surfactant, citri
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Metal complexes of Cu (II), Fe (III) and Mn (II) with Quinaldic acid (L1) and 1, 10-Phenathroline (L2) are synthesized and characterized by standaral physic- chemical procedures (element analysis, metal analysis, FTIR, Uv-Vis, magnetic moment and conductometeric measurements). On the base of these studies, mononuclear and six coordinated octahedral geometry and nonelectrolyte of these complexes have been proposed. The standard heat of formation (?Hºf) and binding energy (?Eb) for the free ligands and their complexes are calculated by using the PM3 method at 273K of Hyperchem.-8 program. The complexes are more stable than their ligands. Moreover, the electrostatic potential of free ligands are measured to investigate the reactive site of th
... Show MoreThe reaction of poly (vinyl alcohol) (PV A) with Urea in (DMSO) resulted in uerthanised oxim, wr,ich reacted with diacetylmonoxime in a (DY.ISOfmethanol) to give anew type (N2) polymeric bidentate imine oxime ligand [HL], The ligand was reacted with MCh (where M= Co, Cu, and Hg). Under reflux in a (DMF/Methanol) mixture with (I:1) ratio to give Complexes of the general formula [M (T.)2]X, (where M= Co,Hg, Cu). All .:ompouncs have been characterized by spectroscopic methods [IR, U.V.-Vis, A tomi<;absorption] microanalysis along with conductivity measurements, from the above:: data the proposed molecular structure for Co,Cu, and Hg is a distorted. Tetrahedml
One of the important goals in the learning process is to be effective learning through the self-direction of the learner , because it has an impact on the effort of learners , it is better to be a learner responsible for learning and independent of the acquisition of knowledge ,
اذ اكدتكثيرAs many have confirmed منFrom الدراساتStudies والادبياتAnd literature انthat فشلالكثير The failure of many منFrom الطلبةStudents فيin a تنظيمgroup المعلوماتthe information ومعالجتهاAnd processed اثناءduring عمليةProcess تعلمهمLearn them لاNo يرجعReturns الىto me انخفاضdrop فيin a درجةDegree ذكائهمTheir intelligence اوor عدمNo
... Show More