New, simple and sensitive batch and reverse FIA spectrophotometric methods for the determination of doxycycline hyclate in pure form and in pharmaceutical preparations were proposed. These methods based on oxidative coupling reaction between doxycycline hyclate and 3-methylbenzothiazolinone-2-hydrazone hydrochloride (MBTH) in the presence ammonium ceric sulfate in acidic medium, to form green water-soluble dye that is stable and has a maximum absorbance at 626 nm. A calibration graph shows that a Beer's law is obeyed over the concentration range of 1-80 and 0.5-110 ?g.mL-1 of DCH for the batch and rFIA respectively with detection limit of 0.325 ?g.mL-1 of DCH for r-FIA methods. All different chemicals and physical experimental parameters affecting the development and stability of the colored product were carefully studied. The proposed methods were successfully applied for the determination of DCH in pharmaceutical preparations.
1,3,4-oxadiazole-5-thion ring (2) successfully formed at position six of 2-methylphenol and five of their thioalkyl (3a-e). Furthermore 6-(5-(Aryl)-1,3,4-oxadiazol-2-yl)-2-methylphenol (5a-i) were formed at position six by two method. The first method was from cyclization their corresponding hydrazones (4a-e) of 2-hydroxy-3-methylbenzohydrazide (1) using bromine in glacial acetic acid. The second method was from cyclization the hydrazide with aryl carboxylic acid in the presence of phosphorusoxy chloride. The newly synthesized compounds were characterized from their IR, NMR and mass spectra. The antioxidant properties of these compounds were screened by 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assay
... Show More1, 3, 4-oxadiazole-5-thion ring (2) successfully formed at position six of 2-methylphenol and five of their thioalkyl (3a-e). Furthermore 6-(5-(Aryl)-1, 3, 4-oxadiazol-2-yl)-2-methylphenol (5a-i) were formed at position six by two method. The first method was from cyclization their correspondinghydrazones (4a-e) of 2-hydroxy-3-methylbenzohydrazide (1) using bromine in glacial acetic acid. The second method was from cyclization the hydrazide with aryl carboxylic acid in the presence of phosphorusoxy chloride. The newly synthesized compounds were characterized from their IR, NMR and mass spectra. The antioxidant properties of these compounds were screened by 2, 2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) a
... Show MoreIn folk medicine there are various medicinal amalgamation possessing hepatoprotective activity. This activity is of significance because several toxins cause liver injury. Hence, many pharmaceutical companies are targeting herbal medicines for the treatment of liver abnormalities and towards evolving a safe and effective formulation with desired route of administration. In current review we have focused on the studies showing hepatoprotective effect using marine compounds and plant derived compounds. Liver disorder, a global health problem, usually include acute or chronic hepatitis, heptoses, and cirrhosis. It may be due to toxic chemicals and certain antibiotics. Uncontrolled consumption of alcohol also affects liver in an unhealthy wa
... Show MorePyridine-2, 6-dicarbohydrazide comp (2) was synthesized from ethanolic solution of diethyl pyridine-2, 6- dicarboxylate comp (1) with excess of hydrazine hydrate. Newly five polymers (P1-P5) were synthesized from reaction of pyridine-2, 6-dicarbohydrazide comp (2) with five different di carboxylic acid in the presence of poly phosphoric acid (PPA). The antibacterial activity of the synthesized polymers was screened against some gram positive and gram negative bacteria. Antifungal activity of these polymers was evaluated in vitro against some yeast like fungi such as albicans (candida albicans). Polymers P3, P4 and P5 exhibited highest antibacterial and antifungal against all microorganisms under test.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe Plerion nebula is characterized by its pulsar that fills the center of the supernova remnant with radio and X-ray frequencies. In our galaxy there are nine naked plerionic systems known, of which the Crab Nebula is the best-known example. It has been studied this instance in order to investigate how the pulsar energy affect on the distribution and evolution of the remnant as well as study the pulsar kick velocity and its influence on the remnant. From the obtained results it's found that, the pulsar of the Crab Nebula injects about (2−3)𝑥 1047 erg of energy to the remnant, although this energy is small compared to the supernova explosion energy which is about 1051 erg but still plays a significant role in the distribution and the m
... Show More