A new derivatives of Schiff bases connected with 5H-thiazolo[3,4-b][1,3,4]thiadiazole ring 5a-c were prepared via many reactions starting by treating 1,4-phenylene diamine 1 with chloroacetylchloride to prepared compound 2, then reaction with p-hydroxybenzaldehyde to synthesize compound 3 then, this was reacted with thioglycolic acid and thiosemicarazide to giveN,N-(1.4-phenylene)bis(2-(4-(2-amino-5Hthiazolo[4,3-b][1,3,4]thiadiazol-5-yl)phenoxy)acetamide) 4. Compound 4 was treated with different aromatic aldehydes to give a new derivatives of Schiff bases containing 5H-thiazolo[3,4-b][1,3,4]thiadiazole ring 5a-c. The synthesized compounds were characterized using FTIR spectrophotometer and 1H NMR spectroscopy and the biological activity of all compounds were studied as well.
Complexes of 1-phenyl-3-(2(-5-(phenyl amino)-1,3,4- thiadiazole-2-yl)phenyl) thiourea have been prepared and characteized by elemental analysis, Ff-[R, and u.v./ visible spectra moreover, determination of metal content M%o by flame atomic absorption spectroscopy, molar conductance in DMSO solution and magnetic moments (peffl. The result showed that the ligand (L) was coordinated to Mn*2, Ni*2, Ct*2,2n*2,Cd*2, and Hg*2 ions through the nitrogen atoms and sulpher atoms. From the result obtained, rhe following general formula [MLClz] has been given for the prepared complexes with an octahedral geometry around the metal ions for all complexes. where M= Mn*2, Ni*2, cu*2, zn*z, cd*z, and Hg*2 l= l-phenyl-3-(2-(5-(phenyl amino)-1, 3,
... Show MoreA survey of haemoproteids among the eight species of Iraq rallids were carried out in the
middle, south, and west of Iraq. Two haemoproteods were recorded, Haeomproteus porzanae
(Galli-Valerio, 1907) as a new record for Iraq and the new species H. baghdadensis described
from Fulica atra L. collected in the middle of Iraq.
The present work represents description of three new species of genus Anthrenus
Geoffory from Iraq, these are : A. aradensis sp. nov., A. fabrici sp. nov. and A.
unicolor sp. nov. Locality, host plants and date of collection were given.
New vision of Mr. Abdul Mahdi Al-Muttafiqi in the light of unpublished documents
The present study introduces description of new species of leafhopper Cicadella latreilla nov. External morphological characters particularly female genitalia were discussed and illustrated, shape of male abdominal apodeme, chaetotaxy of genital style and genital plate of male genitalia, shape of Aedeagus and connective . The external morphological characters were: spotting patterns of vertex, face, pronotum of prothorax, and metothorax, and of lower and upper valves of ovipositors,shape of female seventh abdominasternum.
Abstract
Lack of safe available non-resistant treatment for visceral leishmaniasis (Kala-azar) keeps limiting the complete cure of this disease ,drugs that have toxic side effects or lack of effectiveness have led to disease relapse ,all these factors have lightened the way to the search for imperative drugs from natural resources that have been shown to have antileishmanial activity through literature survey
. In the present study, the comparative in vitro anti-leishmania activity of various fractions of Osteospermum ecklonis aerial parts fractions have been evaluated. Extracts were prepared through maceration and Soxhlet apparatus using 85% meth
... Show MoreThe present work aims to investigate approaches, measures and detection of indoor radon level in buildings of the department of physics in college of science of Baghdad University. CR-39 solid state nuclear track detectors were used to measure the radon concentrations inside the rooms, including five laboratories and five workplace rooms in ground and first storey of the department. The average radon concentration at first storey was found to be 43.1±13.2 Bq/m3 and 40.1±13.4 Bq/m3 at the ground storey. The highest level of radon concentration at the first storey in the radioactive sources store was 87.5±29 Bq/m3 while at the ground storey in room(2) was 70.2±24 Bq/m3 which is due to the existence radioactive sources in some selected
... Show MoreThe study aimed to evaluate injuries and economic losses which caused by rose beetle Maladerainsanabilis (Brenske) on ornamental and fruit plants as introduced insect in Iraq during 2015 and determine infested host plants in addition to evaluate efficacy of pathogenic fungi Metarhiziumanisopiliae (1x10⁹ spore/ ml) and Beauvariabassiana (1x10⁸spore/ ml) in mortality of insect larvae in laboratory and field.The results showed that the insect was polyphagous infested many host plants (20 host plant)Which caused degradation and dead the plants through adult feeding on leaves and flower but large injury caused by larvae feeding on root plants which caused obligate dead to infested plant, the percentage mortality of rose plants 68.6%, pear
... Show MoreSince the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the