Nine new compounds of 2-amino-5-chlorobenzothiazole derivatives were synthesized. These new compounds were formed through the reaction of 2-amino-5-chlorobenzothiazole 1 with ethyl chloroacetate and KOH, which gave an ester derivative 2, followed by refluxing compound 2 with hydrazine hydrate to afford hydrazide derivative 3. The reaction of compound 3 with CS2 and KOH gave 1,3,4-oxadiazole-2-thiol derivative 4, and then the reaction of compound 2 with thiosemicarbazide to produce compound 5 then treated it with 4%NaOH led to ring closure to provide 1,2,4-triazole-3-thiol derivative 6. The reaction of 2-amino-5-chlorobenzothiazole1 with chloroacetic acid gave 7 followed by refluxing the latter compound with ortho amino aniline giving benzimidazole derivative 8. Azomethine 9 was synthesized over 2-amino-6-chloro-benzothiazole with bromobenzaldehyde, the last compound 9 was converted to a thiazolidinone derivative 10 through the reaction of compound 9 with 2-mercaptoaceticacid. The prepared derivatives were established by using FT-IR, 1H-NMR spectroscopy, elemental analysis C.H.N. and physical properties. Entirely compounds were examined for their anti-fungal action against Candida glabrata and Aspergillus niger, and the results revealed that some compounds showed a good measurable activity comparing with fluconazole as stander drug.
Data of multispectral satellite image (Landsat- 5 and Landsat-7) was used to monitoring the case of study area in the agricultural (extension and plant density), using ArcGIS program by the method of analysis (Soil adjusted vegetative Index). The data covers the selected area at west of Baghdad Government with a part of the Anbar and Karbala Government. Satellite image taken during the years 1990, 2001 and 2007. The scene of Satellite Image is consists of seven of spectral band for each satellite, Landsat-5(TM) thematic mapper for the year 1990, as well as satellite Landsat-7 (ETM+) Enhancement thematic mapper for the year 2001 and 2007. The results showed that in the period from 1990 to 2001 decreased land area exposed (bare) and increased
... Show MoreBackground: Thermocycling simulates the temperature dynamics in the oral environment. This in vitro study done to measure and compare the effect of thermocycling on the shear bond strength of stainless steel and sapphire brackets bonded to human enamel teeth using light cured orthodontic adhesive and debonded at various time, and to measure adhesive remnant index after debonding. Materials and Methods: one-hundred-twenty extracted upper first premolars for orthodontic reason were used in this study; depending on weather thermocycled or not, the sample was divided into two main groups, then within each group 30 teeth were used for stainless-steel brackets (Bionic®) and for sapphire brackets (Pure®). Both groups were subdivided into three
... Show MoreAbstract
Mitoxantrone is an antitumor agent used in the treatment of breast and prostate cancer, acute leukemia, lymphoma, and also in the treatment of multiple sclerosis due to its immunosuppressive properties. The mitoxantrone's cardiotoxicity is irreversible, dose-dependent, and it may occur years after treatment. Zinc is considered as an essential mineral for cell division and the synthesis of DNA and protein; furthermore, such mineral has an important role in states of cardiovascular diseases; and may have protective effects in coronary artery disease and cardiomyopathy.
Objective: The current study is designed to investigate effects of two different doses of zinc sulfat
... Show MoreThe use of destructive weapons in wars without restrictions and controls, which eat green and dry land, pollute the environment and cause genocide, has become the problem of the times.
International conventions for the protection of the environment during armed conflicts are characterized by generality, ambiguity, and open to interpretation by the participating states in the agreement, and each state interprets these texts to serve its interests, but the Islamic Sharia stipulates the prohibition of the use of these comprehensive destructive weapons in an unambiguous manner, As stated in the Holy Quran:
... Show MoreAthletics are different from other games as a competition between individuals to show their competence and physical ability to achieve new record numbers in the various activities and various between the boards, jumping and throwing and each type of these activities in particular performance so found the researcher to find the method of training resistors in the development of special power and achievement In the effectiveness of javelin, where the researchers chose the sample of the athletes from the specialized school of athletics to effectively throw the spear at the ages of 15-17 years and carried out the tests of the research, which includes the strength of the speed of the arms and explosive power and The various resistance exercise
... Show MoreA freshwater bivalve plays a crucial function in aquatic habitats as the filtered water and burrowing mussels mix the sediment, thus increasing oxygen content and making the ecosystem healthier. The aim of the study is to see how chlorpyrifos affects biochemical markers in freshwater mussel Unio tigridis. About 180 individuals per taxon and water samples were collected from the Qandil water resource on the Greater Zab River, Erbil Province, Iraq. Once arrived at the lab, the individuals were kept in aquaria with river water and an air-conditioned room Temperature: 25±2 and Light: 12h/12h and acclimatized to laboratory conditions for seven days in aged tap water. The mussel's identification molecularly and the DNA sequence of t
... Show MoreThis research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More