This work involves synthesis of novel Schiff bases derivatives contining isoxazoline or pyrazoline units starting with chalcons . 4-Aminoacetophenone was react with pnitrobenzaldehyde or p-chlorobenzaldehyde in basic medium giving chalcones [I]a,b by claisenschemidt reactions. The chalcones [I]a,b were reacted with hydroxylamine hydrochloride giving isoxazolines [II]a,b in basic medium. The chalcone [I]a could also reacted with hydrazine hydrate to give pyrazolines [III]a . The novel Schiff bases with structural formula [VIII]n , [IX]n , [X]m and [XI]m were prepared by the reaction of amino compounds ; isoxazoline [II]a,b and pyrazolines [III]a with monoaldehydes [VI]n and dialdehydes [VII]m , respectively in dry benzene using drops of glacial acetic acid as a catalyst with reflux . All the synthesized compounds have been characterized by melting points , FTIR , UV-Vis and 1HMNR (of some of theme) spectroscopy
The pandemic SARS-CoV-2 is highly transmittable with its proliferation among nations. This study aims to design and exploring the efficacy of novel nirmatrelvir derivatives as SARS entry inhibitors by adapting a molecular modeling approach combined with theoretical design. The study focuses on the preparation of these derivatives and understanding their effectiveness, with a special focus on their binding affinity to the S protein, which is pivotal for the virus’s access to the host cell. Considering molecular docking aspects in the scope of a study on nirmatrelvir derivatives and S protein, dynamics simulations with 25 nanoseconds of their binding are explored. The study shows that these derivatives might work as effective antivi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAu XIXe siècle, avec l’excès de la passion, le roman français commence à avoir de nouvelles figures. Il tend à être un reflet de la pensée et de la passion. Stendhal et Balzac révèlent ainsi le conflit de l’âme et donnent à leur héros l’impression que tout est permis.
Ces protagonistes doivent, d’une part, subir des fluctuations psychologiques, et d’autre part, ces héros doivent être capables de faire face aux rancunes et aux conflits destructeurs. Les personnages stendhaliens et balzaciens finissent par croire que leur combat ne portera pas ses fruits, parce que toute passion déséquilibrée mènera, soit à la fol
... Show MoreThe current phase distinguish by the rapid scientific development, which pushes individuals to have the necessities of scientific and practical life through the proper scientific thinking which contribute to the development of invention and creativity away from memorizing and indoctrination and encouraging individuals to looking for information and then attempting to process and develop these information instead of being a passive receiver. The investment of minds becomes the logical investment in all societies by preparing the citizen to become able to face life changes and its necessities. It is very important to take care of individuals and develop their mental abilities and thinking skills. The constructive strateg
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
Isradipine related to dihydropyridine (DHP) class of calcium channel blockers (CCBs). It is used to treat hypertension, angina pectoris, as well as Parkinson disease. It goes under the BCS class II drug (low solubility-high permeability). The drug will experience extensive first-pass metabolism in liver, thus, oral bio-availability will be approximately15 to 24 %.
The aim of the study is preparing stable oral oil in water (o/w) nanoemulsion of isradipine to promote the colloidial dispersion of isradipine in the nano range, so that it may be absorded by intestinal lymphatic transport in order to avoid hepatic first-pass metabolism (israpidi
... Show More