Non-steroidal anti-inflammatory drugs (NSAIDs) contain free –COOH which thought to be responsible for the GI irritation associated with all traditional NSAIDs. The esterification of this group is one of an approach to ultimate aim for reduce the gastric irritation; so in this study we synthesized and preliminarily evaluated new ester compounds as new analogues with expected selectivity toward COX-2 enzyme. Synthetic procedures have been successfully developed for the generation of the target compounds (III a and b). The synthetic approach involved multi-steps procedures which include: Synthesis of 4-hydroxy benzene sulphonamide ( I b ), synthesis of Naproxen and Ibuprofen acyl chloride and then reacting them with 4-hydroxy benzene sulphonamide to form final compounds ( III a-b) .The structures of these compounds were identified and characterized using (TLC), infrared spectroscopy (FT-IR), 1H NMR data and microanalysis (CHN).Pharmacological study as anti-inflammatory activities for the final compounds were studied in rats by induced edema type of inflammation. Moreover, the results of a docking study of compounds III a-b into the COX-2 binding site revealed that its mechanism was possibly similar to that of naproxen, a COX-2 inhibitor. The effect of them on COX-2 antibody was showed it could significantly inhibit COX-2 activity.
Background: The influence of glucose metabolism is seen in many infectious diseases, making diabetic patients more vulnerable to sepsis and other serious sequelae of bacterial invasion such as UTI and vaginitis.Patients and method: sixty two patients (women) were suffering from GUTIs consulting Al-Elwya hospital from November- 2009 to March -2010. Two samples were taken from those patients (urine samples and vaginal swabs); these samples were cultured on Blood, Chocolate, and MacConkey's agar for isolation of bacteria.Results: The study group consists of sixty two women suffering from (GUTI), their ages range from 18-55 years. Thirty eight of them were diabetic women and twenty four of them were non- diabetic women. Twenty t
... Show MorePraise be to God, who has seen uniting the wonders of manufactures, and pronounced Pthamidh oddity Alambdoat, and swam his creation in different languages, Glory is not equal to one in the earth and the heavens, praise Him, and I bear witness that there is no god but Allah alone with no partner certificate towering branches, and I bear witness that Muhammad is His slave and Messenger sent swage Arab government balance, and clearest statement, and the highest residence and Ohllagha words, and Oovaha Zmama, he pointed the way and advised the creation, and the month of Islam, breaking idols, and showed provisions, uncle Balanaam, God separated blessings and peace upon our Prophet Muhammad and the God of the good and virtuous and his compani
... Show MoreThis paper presents the thermophysical properties of zinc oxide nanofluid that have been measured for experimental investigation. The main contribution of this study is to define the heat transfer characteristics of nanofluids. The measuring of these properties was carried out within a range of temperatures from 25 °C to 45 °C, volume fraction from 1 to 2 %, and the average nanoparticle diameter size is 25 nm, and the base fluid is water. The thermophysical properties, including viscosity and thermal conductivity, were measured by using Brookfield rotational Viscometer and Thermal Properties Analyzer, respectively. The result indicates that the thermophysical properties of zinc oxide nanofluid increasing with nanoparticle volume f
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreA retrospective study is conducted to identify factors that improve prospective animal studies; contribute to the optimization of animal protection from all unnecessary and preventable damage. Preclinical oral histology research from 2010-2020 is evaluated and 64 studies were reviewed relating to two interventions: bone trauma and surgical incision. The harm-benefit analysis is featured in this study through the application of the recent form of Bateson's Cube. Depending on its three axes, we can assess animal suffering, the likelihood of benefit, and the importance of research. The total number of animals used in the research is 2685. Rats, 51.6%, and rabbits, 48.4%, are the most commonly used animals. Research related to bone healing acco
... Show MoreThe present study cognitive aims to investigate the negation phenomenon in American political discourse under Critical Discourse Analysis (CDA) principles. The research sample includes two speeches given by Clinton and Trump in their election campaigns in 2016. Since the nature of the study follows the social-cognitive approach, the researcher adopted two models of analysis to achieve the study’s objectives: First, the theoretical framework of MST (developed by Fauconnier (1994), Fauconnier and Sweetser (1996) to examine meaning construction resulting from building different levels of negative mental spaces by two different genders the selected speeches. Second, pragmatic model to examine the role of gender from the functional per
... Show MoreThe Iranian-Sudanese relations during the era of the transitional government (1985-1986), and the era of the third democratic government, has seen a marked improvement, particularly since the transitional government, which was formed in Sudan following a popular uprising that toppled former President Jaafar Nimeiri followed based on balancing policy in international relations, which is the same policy adopted by the government of Sadiq al-Mahdi that, especially that Mr. Sadiq al-Mahdi had enjoyed close ties with the government in Tehran before he took office, and on the basis of the policy of diplomatic representation between the two countries returned since the time of the transitional government after relations were severed due to the
... Show MorePraise be to God, and may blessings and peace be upon the Messenger of God, his family and companions, and from his family and after ...
It is the right of every nation to be proud of its heritage, science and civilization among the nations, taking pride in the efforts of its construction and the keenness of its scholars and dedication to serve their nation and their history, and from the great sciences that boast and honor our great nation and distinguish it over others the science of attribution and the preservation of the novel over generations and ages. The novel is preserved from the plagiarism of the nullified, the excess of the deceitful and the liars, and the science of isnad from religion as the scholars said, and without the
The research aim is to identify the concept of fair value and its measurement approaches, shed light on the concept of fraud and its forms, motives, as well as how to identify fraud under the fair value method.
I have been using the program package SSPS statistical in the calculation of the research variables, and the research sample was a group of university professors and auditors working in the federal board of Supreme Audit.
The researcher has reached some conclusions, the most important; the lack of conclusive evidence about management's intent in adopting the use of fair value raises several doubts about the credibility of the statements prepared in under the fa
... Show More