Preferred Language
Articles
/
bsj-2794
Determination of Doxycycline Hyclate by Batch and Reverse Flow Injection Analysis Based on the Oxidative Coupling Reaction with 3-Methyl-2-benzothiazolinone Hydrazone hydrochloride (MBTH)
...Show More Authors

New, simple and sensitive batch and reverse FIA spectrophotometric methods for the determination of doxycycline hyclate in pure form and in pharmaceutical preparations were proposed. These methods based on oxidative coupling reaction between doxycycline hyclate and 3-methylbenzothiazolinone-2-hydrazone hydrochloride (MBTH) in the presence ammonium ceric sulfate in acidic medium, to form green water-soluble dye that is stable and has a maximum absorbance at 626 nm. A calibration graph shows that a Beer's law is obeyed over the concentration range of 1-80 and 0.5-110 ?g.mL-1 of DCH for the batch and rFIA respectively with detection limit of 0.325 ?g.mL-1 of DCH for r-FIA methods. All different chemicals and physical experimental parameters affecting the development and stability of the colored product were carefully studied. The proposed methods were successfully applied for the determination of DCH in pharmaceutical preparations.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 25 2017
Journal Name
Oriental Journal Of Chemistry
Relationship Between the structure of Newly Synthesized derivatives of 1,3,4-oxadiazole Containing 2-Methylphenol and their Antioxidant and Antibacterial Activities
...Show More Authors

1,3,4-oxadiazole-5-thion ring (2) successfully formed at position six of 2-methylphenol and five of their thioalkyl (3a-e). Furthermore 6-(5-(Aryl)-1,3,4-oxadiazol-2-yl)-2-methylphenol (5a-i) were formed at position six by two method. The first method was from cyclization their corresponding hydrazones (4a-e) of 2-hydroxy-3-methylbenzohydrazide (1) using bromine in glacial acetic acid. The second method was from cyclization the hydrazide with aryl carboxylic acid in the presence of phosphorusoxy chloride. The newly synthesized compounds were characterized from their IR, NMR and mass spectra. The antioxidant properties of these compounds were screened by 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assay

... Show More
Scopus (12)
Crossref (4)
Scopus Crossref
Publication Date
Fri Aug 25 2017
Journal Name
Oriental Journal Of Chemistry
Relationship Between the structure of Newly Synthesized derivatives of 1,3,4-oxadiazole Containing 2-Methylphenol and their Antioxidant and Antibacterial Activities
...Show More Authors

1, 3, 4-oxadiazole-5-thion ring (2) successfully formed at position six of 2-methylphenol and five of their thioalkyl (3a-e). Furthermore 6-(5-(Aryl)-1, 3, 4-oxadiazol-2-yl)-2-methylphenol (5a-i) were formed at position six by two method. The first method was from cyclization their correspondinghydrazones (4a-e) of 2-hydroxy-3-methylbenzohydrazide (1) using bromine in glacial acetic acid. The second method was from cyclization the hydrazide with aryl carboxylic acid in the presence of phosphorusoxy chloride. The newly synthesized compounds were characterized from their IR, NMR and mass spectra. The antioxidant properties of these compounds were screened by 2, 2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) a

... Show More
View Publication
Scopus (12)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 09 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
An Overview of Some Plant Based Products With Hepatoprotective Activity
...Show More Authors

In folk medicine there are various medicinal amalgamation possessing hepatoprotective activity. This activity is of significance because several toxins cause liver injury. Hence, many pharmaceutical companies are targeting herbal medicines for the treatment of liver abnormalities and towards evolving a safe and effective formulation with desired route of administration. In current review we have focused on the studies showing hepatoprotective effect using marine compounds and plant derived compounds. Liver disorder, a global health problem, usually include acute or chronic hepatitis, heptoses, and cirrhosis. It may be due to toxic chemicals and certain antibiotics. Uncontrolled consumption of alcohol also affects liver in an unhealthy wa

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Alexandria Engineering Journal
Batch and continuous study of one-step sustainable green graphene sand hybrid synthesized from Date-syrup for remediation of contaminated groundwater
...Show More Authors

Scopus (26)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Global Pharma Technology
Synthesis, Characterization, Antibacterial and Antifungal Activity of Some Bis (1, 3, 4-oxadiazole) Polymer
...Show More Authors

Pyridine-2, 6-dicarbohydrazide comp (2) was synthesized from ethanolic solution of diethyl pyridine-2, 6- dicarboxylate comp (1) with excess of hydrazine hydrate. Newly five polymers (P1-P5) were synthesized from reaction of pyridine-2, 6-dicarbohydrazide comp (2) with five different di carboxylic acid in the presence of poly phosphoric acid (PPA). The antibacterial activity of the synthesized polymers was screened against some gram positive and gram negative bacteria. Antifungal activity of these polymers was evaluated in vitro against some yeast like fungi such as albicans (candida albicans). Polymers P3, P4 and P5 exhibited highest antibacterial and antifungal against all microorganisms under test.

Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Iraqi Journal Of Physics
Determination of the energy and kick velocity of Crab Nebula pulsar from the distribution morphology of the remnant
...Show More Authors

The Plerion nebula is characterized by its pulsar that fills the center of the supernova remnant with radio and X-ray frequencies. In our galaxy there are nine naked plerionic systems known, of which the Crab Nebula is the best-known example. It has been studied this instance in order to investigate how the pulsar energy affect on the distribution and evolution of the remnant as well as study the pulsar kick velocity and its influence on the remnant. From the obtained results it's found that, the pulsar of the Crab Nebula injects about (2−3)𝑥 1047 erg of energy to the remnant, although this energy is small compared to the supernova explosion energy which is about 1051 erg but still plays a significant role in the distribution and the m

... Show More
Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Determination of the energy and kick velocity of Crab Nebula pulsar from the distribution morphology of the remnant
...Show More Authors

View Publication Preview PDF
Crossref