Several azo dyes were synthesized through coupling reaetion of some substituted phenols and B.naphthol with diazonium salt of 2- amino-1,3-4- thiadiazol -5- thiol. All the synthesized compounds during this work were characterized using some speetral data (F.TIRand UV)andM.P . 2-[4 --Hydroxy napthyl-azo ] -1,3,4-Thiadiazol -5-Thiol • 2- [2-- hydroxy –4- NO2 – phenyl- azo]- 1,3,4 - Thiadiazol –5-Thiol. • 2- [3--Amino-4-Hydroxy phenyl –azo]-1,3,4 - Thiadiazol –5-Thiol. . • 2-[2--Amino-4-Hydroxy phenyl -azo]-1,3,4 - Thiadiazol –5-Thiol . • 2- [3--Amino-6- Hydroxy phenyl -azo]-1,3,4 - Thiadiazol –5-Thiol. • 2-[2-- Hydroxy- 5 – chloro – Pheny - azo]- 1,3,4 - Thiadiazol –5-Thiol . • 2- [4-- Hydroxy phenyl -azo] -1,3,4 - Thiadiazol –5-Thiol . • 2- [ 3-- Bromo – 6 -- Hydroxy - phenyl –1-azo] – 1,3,4, Thiadiazol –5-Thiol .
Background: Animal bites in humans are an important public health problem. Most of these bites are dog bites. Dog bites in humans are a complex problem embracing public health and animal welfare, both in developed and developing nations. .
Al-kindy Col Med J Vol.8 No.2 2012 P: 151
Objectives: in order to estimate the magnitude of the problem and to understand the epidemiological characteristics of dog bite victims registered in Baghdad city regarding their age, sex, number of registered dog bite victims per month and year along the studied period ( 2006-2010) and also to sniff out any seasonal variation in dog bite attacks .
Methods: A across-sectional study was carried out during January (2011), in the Anti-Rabies clinic of (Pa
Nanocrystalline aluminophosphate AlPO4-5 molecular sieves were synthesized by hydrothermal method (HTS). Synthesis parameters like time and temperature of crystallization were investigated. Type of template (R) and ratio of R/P2O5 were studied also. Characterization of the synthesized AlPO4-5 were done by powder X-ray diffraction (XRD), scanning electron microscopy (SEM/EDX), Fourier transform infrared (FTIR), differential scanning calorimetry-thermogravimetry analysis (DSC-TGA), and N2 adsorption-desorption BET analysis. XRD patterns results showed excellent crystallinity for two types of templates, di-n-propylamine (DPA) and tetrapropyl ammonium hydroxide (TPAOH) f
... Show MoreThe angiotensin converting enzyme (ACE) I\D gene polymorphism influences the blood ACE enzyme activity. Renoprotective effect of ACE inhibitors (ACEIs) varies among patients due to genetic variation, particularly in Renin-Angiotensin-Aldosterone System genes. This study investigates the genetic variations of ACE I\D and AGT1RA1166C gene polymorphisms in the antiproteinuric effect of ACEI therapy in type 2 diabetes mellitus (T2DM) patients. This is a cross-sectional study that included 76 T2DM patients who are ACEI users, divided into two groups: T2DM without diabetic kidney disease (DKD) included 31 patients, and T2DM with DKD included 45 patients. Urine samples were taken for measurement of urine albumin and creatinine, then calcul
... Show More2(2-Tetrahydropyranylthio) methyl cyclopropyl amines were synthesized from allylmercaptan through several steps. The structures of the intermediates and the final products where confirmed through IR, NMR and elemental analysis, these compounds may be of value in the treatment of diseases where free radicals are implicated in their pathogensis, since the thio and the amino groups of the synthesized compounds may act as free radical scavengers.
This paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conc
... Show MoreIntroduction: Cutaneous leishmaniasis is considered a parasitic contagion resulting from the flagellated parasite belonging to the genus of Leishmania. Also, cutaneous leishmaniasis is a zoonotic ailment transmitted through the bloodsucking sand-flies bite (belonging to the Phlebotomus genus). The disease's reservoirs included wild or semi-domesticated animals, in general rodents and dogs. Tissue inhibitor metalloproteinase-1 (TIMP-1) is one of the extracellular matrix proteins that have a role in vessel wall degeneration and aneurysm development. In addition, it belongs to the zinc-dependent endopeptidases family that are involved in the degradation of connective tissues proteins which are included in vascular integrity maintenance. The Ge
... Show MoreCopper is a cheaper alternative to various noble metals with a range of potential applications in the field of nanoscience and nanotechnology. However, copper nanoparticles have major limitations, which include rapid oxidation on exposure to air. Therefore, alternative pathways have been developed to synthesize metal nanoparticles in the presence of polymers and surfactants as stabilizers, and to form coatings on the surface of nanoparticles. These surfactants and polymeric ligands are made from petrochemicals which are non- renewable. As fossil resources are limited, finding renewable and biodegradable alternative is promising.The study aimed at preparing, characterizing and evaluating the antibacterial properties of copper nanoparticle
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More