The coordination ability of the azo-Schiff base 2-[1,5-Dimethyl-3-[2-(5-methyl-1H-indol-3-yl)-ethyl imino]-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylazo]-5- hydroxy-benzoic acid has been proven in complexation reactions with Co(II), Ni(II), Cu(II), Pd(II) and Pt(II) ions. The free ligand (LH) and its complexes were characterized using elemental analysis, determination of metal concentration, magnetic susceptibility, molar conductivity, FTIR, Uv-Vis, (1H, 13C) NMR spectra, mass spectra and thermal analysis (TGA). The results confirmed the coordination of the ligand through the nitrogen of the azomethine, Azo group (Azo) and the carboxylate ion with the metal ions. The activation thermodynamic parameters, such as ΔE*, ΔH*, ΔS*, ΔG*and K are cal
... Show MoreA new Schiff base of 4- flourophenyl-4- nitrobenzyliden (L) ,was prepared and used to prepare a number of metal complexes with Cr (III) , Fe (III), Co(II) ,Ni (II) and Cu (II). These complexes were isolated and characterized by (FITR),UV-Vis spectroscopy and flame atomic absorption techniques in addition to magnetic susceptibility, and conductivity measurements. The study of the nature of the complexes formed in ethanol was done following the molar ratio method gave results, agreed with those obtained from isolated solid state studies. The antibacterial activity for the ligand and its metal complexes were examined against two selected microorganisms, Pseudomonas aeruginosa and Staphylococcus aureus.The results indicated that the complexes
... Show MoreIn this research, 5- membered heterocyclic compounds as oxazolidine-5-one J1-J5 derivatives were prepared using primary aromatic amine, aromatic carbonyl compounds and chloroacetic acid. By combining primary aromatic amines and aromatic carbonyl compounds, Schiff's bases were synthesized. Schiff bases are used with the chloroacetic acid compound to prepare oxazolidine-5-one J1-J5 derivatives. The compounds J1-J5 were described using NMR spectroscopy and FT-IR. .The biological efficacy was evaluated according to maximum inhibitory concentrations (MICs) toward Staphyloccoccus aureus and Esherichia coli. The best MIC was 210 μg ml-1 for J4 against the two pathogenic bacteria, while J1, J4, and J1 did not show any inhibitory effect against all
... Show MoreIn this study, synthesised new ligand: potassium 2,2'-(quinoxaline-2,3- diyl)bis(1-phenylhydrazinecarbodithioate) (L). The ligand synthesised by reacting N1,N2-dip-tolyloxalamide as the starting material with CS2 and KOH to add the CS2 group and then with phenylendiammine to achieve (L). The ligand used in the synthesis of complexes with (CoII, NiII and CdII). The new ligand and its complexes characterised by FT-IR, UV-Vis, 1H, 13C-NMR, Mass spectroscopy, and elemental analysis, in addition to the above techniques were using magnetic moment, atomic absorption, chloride content, and melting point to describe the metal complexes.
Background: Ankylosing spondylitis is a chronic inflammatory disease that mostly involves the spine and sacroiliac joints. It is associated with a decreased quality of life. Biological medicines such as infliximab and its biosimilar are the mainstay treatments for active ankylosing spondylitis.
Objective: The study objective was to conduct a pharmacoeconomic study comparing the cost-effectiveness of the reference infliximab with its biosimilar in ankylosing spondylitis patients visiting public hospitals.
Subjects and Method: This is a two-center pharmacoeconomic study performed at two large teaching governmental hospitals in Baghdad, Iraq, which s
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThis paper aims at presenting a comparison between objective and subjective tests . This paper attemptsto shed light on these two aspects of tests and make do a compression by using suitable techniques for objective and subjective tests .
The paper compares between the two techniques used by the objective and subjective tests respectively, the time and efforts required by each type, the extent to which each type can be reliable, and the skills each type is suitable to measure.
The paper shows that objective tests, on the contrary of the subjective ones, encourages guess> Objective tests are used to test specific areas of langua
... Show More