4-(((4-hydroxy-3,5-dimethoxybenzyl)oxy)methyl)benzoic acid was synthesized from multisteps and converted to their corresponding hydrazide. The corresponding hydrazide was cyclized to their corresponding 5-amino-1,3,4-oxadizole. Newly Schiff bases (7a-7e) were synthesized from reaction the 5-amino-1,3,4-oxadizole with several substituted of 4-hydroxybenzylaldehyde. The resulting compounds were characterized based on their IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to test the antioxidant properties of the synthesized compounds. Compound 7d and 7e exhibited significant free-radical scavenging ability in both assays.
AASAH Enass J Waheed, Shatha MH Obaid, Research Journal of Pharmaceutical, Biological and Chemical Sciences, 2019 - Cited by 5
Oral jelly is a semisolid preparation that could resolve problem associated withdosage form’s swallowing, especially in pediatric and elderly ones. This work aimedto prepare oral flurbiprofen (FBP) jelly to improve patient compliance. Heating andcongealing method was used to prepare FBP jelly using three different polymers (pectin,sodium carboxymethyl cellulose, and hydroxypropyl methylcellulose). The effect ofdifferent concentrations of pectin and sucrose on jelly properties was studied. Theresults revealed that both pectin and sodium carboxymethyl cellulose polymers gaveacceptable jelly appearance and consistency. It was also observed that the increase ofpectin or sucrose concentration had a significant impact on jelly viscosity. All pe
... Show MoreThe present investigation aims to determine the effects of aflatoxin B1 (AFB1) on biotransformation and antioxidant genes and the protective effects of curcumin, present in turmeric (Curcuma longa) powder (TMP). Specifically, the study included four groups of albino mice were fed for 30 days on diet Group I: Control, Group II: animals fed on the conventional basal diet supplemented with 0.5% food grade TMP that supplied 74 mg/kg total curcuminoids. Group III contained animals reared on conventional basal diet supplemented with 1.0 ppm AFB1 supplied by ground aflatoxin culture material (760 ppm AFB1). Finally, Group IV comprised of albino mice fed with basal diet supplemented with 1.0 ppm AFB1 and 0.5% TMP that supplied 74 mg/kg of the
... Show MoreA series of metal ion complexes of some divalent transition metal ions having the general composition [ML2Cl2]nH2O with 2-(benzo[d]thiazol-2-ylamino)-2- (5-chloro-2-hydroxy phenyl) acetonitrile ligand has been prepared from 5-chloro-2-hydroxy-benzaldehyde and benzo[d]thiazol-2-amine. Existence of cyanide as potassium cyanide in acidic medium was considered, characterized by elemental chemical analysis, conductance of molarity, magnetic susceptibility measurements, FTIR electronic spectral studies and mole ratio method. FTIR indicates the participation of amino and acetonitrile nitrogen which is coordinated with the central metal ion.
This study examines the opportunity presented by the COVID-19 pandemic for city planners and leaders to learn from the crisis and build resilient cities with long-term societal, economic, and environmental resilience against future disasters. The research focuses on the relationship between urban planning and policies and the extent of their resilience, particularly in response to pandemic-related disasters. The study evaluates the ability of the city of Baghdad to respond to the pandemic and identifies gaps in its resilience. The study uses the scorecard measurement instrument to examine the disaster resilience of cities, with a focus on governance and financial capability, disaster planning and preparedness, and disaster response
... Show MoreBiological Activity of Complexes of Some Amino Acid
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More