The present study was designed to synthesize a number of new Ceftriaxone derivatives by its involvement with a series of different amines, through the chemical derivatization of its 2-aminothiazolyl- group into an amide with chloroacetyl chloride, which on further conjugation with these selected amines will produce compounds with pharmacological effects that may extend the antimicrobial activity of the parent compound depending on the nature of these moieties.
Ceftriaxone was first equipped with a spacer arm (linker) by the action of chloroacetyl chloride in aqueous medium and then further reacted with seven different aliphatic and aromatic amines which resulted in the production of the aimed final target products. The syntheses
... Show MoreThe amino thiadiazole [I] on treatment with aromatic aldehydes yielded Schiff bases [IIa-c], which cyclized to thiazolidinone [IIIa-c] derivatives by reaction with thioglycolic acid. Reaction of carbon disulfide and methyl iodide with [I] gavedithiomethyl [IV] which on treatment with o-phenylenediamine gave the condensed N-Imidazolythiadiazolylamine [V], However, reaction of [I] with phenylisocyanate and phenylisothiocyanate afforded the carbamideand carbothiamide derivatives [VI. VII] ac. The structure of these compounds was characterized from their melting point, FTIR spectroscopy and elementalanalysis
Abstract
Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is “Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim
... Show MoreBackground: Determination of sex from an unknown human bone is an important role in forensic and anthropology field. The mandible is the largest and hardest facial bone, that commonly resist postmortem damage and forms an important source of information about sexual dimorphism. Mandibular ramus can be used to differentiate between sexes and it also expresses strong univariate sexual dimorphism. This study was undertaken to assess the usefulness of mandibular ramus as an aid in sex differentiation using CT scanning among Iraqi population. Materials and methods: 3D reconstructed computed tomography scanning of 140 Iraqi Arab subjects, (7 0 males and 70 females) were analyzed with their age range from 20-60 years old. The linear measurements w
... Show MoreRecently The problem of desertification and vegetation cover degradation become an environmental global challenge. This problem could be summarized as as the land cover changes. In this paper, the area of Al- Muthana in the south of Iraq will be consider as one of Semi-arid lands. For this purpose, the Ladsat-8 images can be used with 15 m in spatial resolution. In order to over Achieve the work, many important ground truth data must be collected such as, rain precipitation, temperature distribution over the seasons, the DEM of the region, and the soil texture characteristics. The extracted data from this project are tables, 2-D figures, and GIS maps represent the distributions of vegetation areas, evaporation / precipitation, river levels
... Show MoreIn this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show More