In this work, a series of new maleimides linked to substituted benzothiazole moiety were synthesized. Synthesis of these new cyclic imides were performed via three steps, the first one involved preparation of a series of 2-aminobenzothiazole substituted with different substituents via reaction of different primary aromatic amines with ammonium thiocyanate and bromine in glacial acetic acid. The prepared 2- amino benzothiozoles were introduced in the second step in reaction with maleic anhydride producing a series of N-(substituted benzothiazole-2-yl) maleamic acids.The resulted maleamic acids were dehydrated in the third step via treatment with acetic anhydride and anhydrous sodium acetate to afford a series of the desirable N-(substituted benzothiazole -2-yl) maleimides.The synthesized maleimides were screened for thier antibacterial activity against two types of bacteria including (staphylococcus aureus) Gram positive and (Klebsiella pneumoniae) Gram negative bacteria respectively.Antifungal activity of the prepared imides also were tested against (Candida albicans) fungi.The new compounds were found to exhibit good antibacterial and antifungal activities.
Background: Complete removal of filling material from the root canal is an essential requirement for endodontic retreatment. The purpose of the present study is to evaluate and compare the dissolving capabilities of various solvents (Xylene, Eugenate Desobturator, Eucalyptol, EDTA and Distilled water (as a control)) on four different types of sealer (Endofill, Apexit Plus, AH Plus and EndoSequence bioceramic sealer). Materials and method: Eighty samples of each sealer were prepared according to the manufacturers' instructions and then divided into ten groups (of 8 samples) for immersion in the respective solvents for 2 and 5 min immersion periods. Each sealer specimen was weighed to obtain its initial mass. The specimens were immersed in
... Show MoreAbstract
To evaluate the effectiveness of Phenolic Compound of Salvia Frigida on induced atopic dermatitis (AD) of mice. Forty mice were included in the study, divided in to four groups (10 mice/group): apparently healthy, induced AD without treatment, induced AD treated with tacrolimus 0.1% ointment, and induced AD treated with Phenolic Compound of Salvia Frigida cream 5%. Examination of histopathology was done and skin homogenates levels also measured. Levels of WBC, Eosinophil, skin tissue homogenate of IL-13 and IL-4, serum IgE, and histopathological scores were significantly increased among induced non treated AD group in comparison with control group. Comparisons of non-treated induced AD
... Show MoreThe problem of research is the need to find out the obstacles and difficulties facing women in accessing leadership positions at the University of Baghdad from their point of view. The importance of research comes from the importance of women in the university and their vital role in the development of society. The research objectives summarized the most important obstacles facing women Access to the leadership positions in the university and the relative weight of these obstacles as well as trying to identify differences in their view of these obstacles according to the variables of specialization (scientific, human) and the scientific title (Professor, Assistant Professor, Teacher, Assistant Lecturer). They were (144) university female
... Show MoreThe method of incineration was chosen to treat the most commonly used antimicrobial agents in Iraq (Triclabendazol, Oxfendazol, Mebendazole), which are antibiotics for children. The moisture content and chemical oxygen demand (COD) were examined and the results were (93.34, 94.88, 92.97)%, (52000, 33200, and 64000) mg/ L. The temperature was determined as a variable in the burning process (600, 500, 400)° C for the purpose of calculating the loss of ignition LOI and determining the ideal temperature. The results of the models (Triclabendazol, Oxfendazol, Mebendazole) (94.92, 93.12, 58.81% and 88.87), (62.61, 44.08%, 98.75, 84.98 and 55.086)% respectively. When mixing the three models in equal proportions, the percentage of loss was 92.8
... Show MoreIn this paper we proposes the philosophy of the Darwinian selection as synthesis method called Genetic algorithm ( GA ), and include new merit function with simple form then its uses in other works for designing one of the kinds of multilayer optical filters called high reflection mirror. Here we intend to investigate solutions for many practical problems. This work appears designed high reflection mirror that have good performance with reduction the number of layers, which can enable one to controlling the errors effect of the thickness layers on the final product, where in this work we can yield such a solution in a very shorter time by controlling the length of the chromosome and optimal genetic operators . Res
... Show MoreSince the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show MoreThis paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.
Finally, all algori
... Show More