Preferred Language
Articles
/
bijps-415
Synthesis of new derivatives of Ceftazidime as possible Prodrugs
...Show More Authors

Five new ceftazidime derivatives were designed and synthesized in an attempt to improve the acid stability and may increase the spectrum of ceftazidime. The synthesized compounds included;  Schiff base of ceftazidime (compound 1), ceftazidime lysine amide Schiff base (compound 2), ceftazidime lysine amide (compound 3), ceftazidime-di-lysine amide Schiff base (compound 4) and ceftazidime-di-lysine amide (compound 5). New ceftazidime derivatives were successfully prepared characterized and identified using spectral and elemental microanalysis (CHNS) analyses and the results comply with the calculated measurements.

Compounds 1 and 2 were subjected to a stability study in phosphate buffer (0.2M, pH 7.4) and in KCl/HCl buffer (0.2M, pH 1.2) at different time intervals (0 – 240 min) incubated at 37 °C. This revealed that both compounds in phosphate buffer (0.2M, pH 7.4) are significantly stable with t 1/2 of 18hrs and 24hrs respectively. However, compounds 1 and 2 are less stable in KCl/HCl buffer (0.2M, pH 1.2) with t1/2 of 3.48hrs and 3.13hrs respectively.

The antibacterial evaluation of the new ceftazidime derivatives showed various degrees of antibacterial activities when compared with ceftazidime. The chemical modifications of ceftazidime showed slight effect on activities and most of compounds retained the antibacterial activities. Compounds 2 and 4  afforded comparable antibacterial action. However, compounds 3 and 5 were equipotent with ceftazidime with respect to E.coli and Staph. aureose. Compound 4 has better activity than ceftazidime with respect to Pseudomonas  aeruginosa. Schiff's base derivative of lysine (2, 6-bis-(benzylideneamino) hexanoic acid) gave a reasonable antibacterial action towards Escherichia coli and Streptococcus Spp; as compared with lysine which has no antibacterial activity.

Key words: Ceftazidime, Schiff bases, Lysine.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 28 2020
Journal Name
Journal Of Research On The Lepidoptera
Description of New Iraqi Spider Ananeon Howardensis (Arachnida: Salticidae) and the Prey Capture Method
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Dec 09 2021
Journal Name
Journal Of Polymer Research
A new generation of cable grade poly(vinyl chloride) containing heavy metal free modifier
...Show More Authors
Abstract<p>Many additives are used to improve the performance of cables in terms of increasing their flame retardancy, thermal stability, thermal conductivity, and other characteristics. Unfortunately, most of these additives contain heavy metals. Therefore, the main objective of this study is to introduce a material representing a new generation of environmentally friendly heavy metal-free stabilizers for cable grade poly(vinyl chloride) that can compete with traditional materials in terms of performance and distinctive properties. This unique additive is Oxydtron, a synthetic silicate or simply nanocement. The tests performed are rheological properties represented by a capillary rheometry analysis, limiting o</p> ... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
New Approaches of Cloud Services Access using Tonido Cloud Server for Real-Time Applications
...Show More Authors

A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jan 29 2021
Journal Name
Research Journal Of Pharmacy And Technologythis Link Is Disabled.
Exploration of a new fluoride resistance gene (Fram gene) in oral streptococcus mutans maw
...Show More Authors

Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Designand Implementation of New DES64X and DES128X on 32, 64 Bit Operating System Environments
...Show More Authors

In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A NEW SPECIES OF THE GENUS POLLENIA ROB.-DESVOIDY, 1830 (DIPTERA : CALLIPHORIDAE) FROM IRAQ
...Show More Authors

This research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.

View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
A New Two Derivative FSAL Runge-Kutta Method of Order Five in Four Stages
...Show More Authors

A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Mechanical Engineering Research And Developments
Development of natural convection heat transfer in heat sink using a new fin design
...Show More Authors

Scopus (2)
Scopus
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref