The aim of the present study was to investigate the nephroprotective, hypolipidemic and hypoglycemic effects of Allium porrum (leek) in rabbits with cisplatin nephrotoxicity. Forty adult male New Zealand rabbits were divided randomly into four groups (ten rabbits in each group) as follows: Group I: (negative control) (C) received oral daily dose of distilled water for 15 successive days. Groups II: (Leek) (L) received oral daily dose of aqueous leek extract (500mg/kg/day) for 15 successive days. Group III: (positive control) [cisplatin (CP)] received oral daily dose of distilled water for 15 successive days, and subsequently administered single dose of Cisplatin (3.5mg/kg/day) by intraperitoneal injection from day 10 for five days. Groups IV: (Leek and Cisplatin
Reaction of Na2PdCl4 with benz-1,3-imidazole-2-thione or (bzimtH) benz-1,3-thiazoline2-thione (bztztH) in ethanol / NE3 afford complexes of the type [Pd(bzimt)2](1) and [Pd(bztzt)2](2) respectively. Treatment of [Pd(L)2] L= bzimt or bztzt with bidentate ligands (N^N) where N^N= bipyridine (Bipy) , phenanthroline (Phen) , ethylene diamine , or N,N′dimethylethylene diamine afford mononuclear complexes of the type [PdL2(N^N)]. The bzimt and bztzt ligands are coordinated as bidentate chelating ligands through the S and N in (1) and (2) whereas bonded as a monodentate fashion via the sulfur atom in other complexes. The prepared complexes were characterized by elemental CHN analysis, ir and 1H nmr spectra.
New tetradentate Schiff base [H2L] namely [2,2׳ -(ethane-1,2- diylbis (azan-1-ylylidene) diacetic acid)] was prepared from condensation of ethylenediamine with glyoxylic acid in ethanol as a solvent in presence of drops of 48% HBr .The structure of ligand (H2L) was characterized by,F-IR, U.V-Vis.,1H-,13C-NMR, pectrophotometer,melting point and elemental microanalysis C.H.N. Metal complexes of the ligand (H2L) in general Molecular formula [M(L)(H2O)2], where M= Co(II), Ni(II), Cu(II), Mn(II) and Hg(II); L=(C6H8N2O4) were synthesized were characterized by, Atomic absorption, F-IR, U.V-Vis. spectra, molar conductivity and magnetic susceptibility.It was found that all the complexes showed octahedral geometries.And
... Show MoreIn this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C
... Show MoreA series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreSynthesis and preliminary biological evaluation of imidazo (2, 1-b) Thiazole derivatives is reported. Under Mannich conditions, a series of new imidazo (2, 1-b) Thiazole derivatives were synthesized. Starting from the reaction of 2- amino thiazole with 4- bromo phenyl bromide to produce 5-(4-bromo phenyl) imidazo (2, 1-b) thiazoles, following by introduce the substituted aminomethyl at position 6-by reacting with different aromatic amines under Mannich conditions to afford 6-secondary amine-5-(4-bromo phenyl) imidazo (2,1-b) thiazole in high yields.
FT-IR, 1H NMR, and 13C NMR techniques were used to characterize the synthesized derivatives. In addition, all compounds were tested for their antioxidant activity, and thr
... Show More