The derivatives formed after the successive acetylation, esterification and nitration reactions to cholic, deoxycholic, and taurocholic acids were identified to be of the following general strucure: Colt, Where RI=NO3, OH, 0=, or CH3COO. R2=H, NO3, OH, 0-=, or CH3COO. R3=H, NO3,01-1, 0=, or CH3COO. R4=OH, NH(CH2)2S03Na, NH(CH2)2S03H, or OMe. By using U.V-visible and I.R spectrophotometry . The number of hydroxyl groups was determined, purity was checked from T.L.C, Most of these derivatives will find pharmaceutical application.
Three of imide intermediate products were synthesized by reacting of phthalic anhydride with glycine (2a), and tetrachloro phthalic anhydride with glycine , (S)-2-[(tert-Butoxycarbonyl)amino]-3-aminopropionic acid ( 2b,c) respectively in dry toluene with azeotropic removal of water using Dean- stark apparatus then carboxyl functional group activated by refluxing with thionyl chloride, the resulted acid chloride (3a-c) were reacted with different amine (5-flourouracil, 4-chloroaniline, 4-bromoaniline, 2-amino thiazole, and pyrrolidine) (4a-e) , the resulted products consider as
... Show MoreThis study includes the synthesis of new derivatives of 1, 2, 4- Triazole which are contain Schiff bases derived from 1, 4, 5, 6- tetrahydropyrimidine. The structures of these derivatives were characterized from their melting points, infrared spectroscopy and elemental analysis. These derivatives were tested for inhibition of E-coli and were all found to be active.
A new series of N-acyl hydrazones (4a-g) derived from indole-3-propionic acid (IPA) were synthesized. These N-acyl hydrazones were prepared by the reaction of 3-(1H-indol-3-yl) propane hydrazide and aldehyde in the existence of glacial acetic acid as a catalyst. 1HNMR and FT-IR analyses were used to identify the synthesized compounds and they were in vitro evaluated as antibacterial agents against six different types of microorganisms by using well diffusion method. All the tested N-acyl hydrazones (4a-g) displayed moderate activity against the Gram-negative E.coli, comparable to that of Amoxicillin. Some of the tested N-acyl hydrazones also exhibited intermediate activity ag
... Show MoreA new series of metal ions complexes of VO(II), Cr(III), Mn(II), Zn(II), Cd(II) and Ce(III) have been synthesized from the Schiff bases (4-chlorobenzylidene)-urea amine (L1) and (4-bromobenzylidene)-urea amine (L2). Structural features were obtained from their elemental microanalyses, magnetic susceptibility, molar conductance, FT-IR, UV–Vis, LC-Mass and 1HNMR spectral studies. The UV–Vis, magnetic susceptibility and molar conductance data of the complexes suggest a tetrahedral geometry around the central metal ion except, VOII complexes that has square pyramidal geometry, but CrIII and CeIII octahedral geometry. The biological activity for the ligand (L1) and its Vanadium and Cadmium complexes were studied. Structural geometries of com
... Show MoreTitanium dioxide nanorods have been prepared by sol-gel template
method. The structural and surface morphology of the TiO2 nanorods was
investigated by X-ray diffraction (XRD) and atomic force microscopy
(AFM), it was found that the nanorods produced were anatase TiO2 phase.
The photocatalytic activity of the TiO2 nanorods was evaluated by the
photo degradation of methyl orange (MO). The relatively higher
degradation efficiency for MO (D%=78.2) was obtained after 6h of exposed
to UV irradiation.
This study aimed to develop an oral drug delivery system for gastro-retentive sustained drug release of baclofen by using a 3D printed capsular device since baclofen has a short half-life of 2.5 to 4 hours and has a narrow absorption window. Firstly sustained-release tablets of baclofen were formulated through the hot-melt extrusion of various thermoplastic polymers and direct compression of the extrudate, then a capsular device was designed and 3D printed to contain two air pockets to enable floating of the device and has four windows for drug release.
3D printing of the capsular device was done by an FDM printer using biodegradable PLA filament, and the sustained release tablets were inserted into the device to allow the medici
... Show MoreThere are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif temp
... Show MoreThis paper investigates the collocational use of irreversible food binomials in the lexicons of English (UK) and Arabic (Iraq), their word-order motivations, cultural background, and how they compare. Data consisted in sixteen pairs in English, versus fifteen in Arabic. Data analysis has shown their word order is largely motivated by logical sequencing of precedence; the semantically bigger or better item comes first and the phonologically longer word goes last. These apply in a cline of decreasing functionality: logical form first, semantic importance second, phonological form last. In competition, the member higher in this cline wins first membership. While the entries in each list clearly reflect culturally preferred food meals in the UK
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More