This review sums up the developments in the biological activity of tetrazole active derivatives in recent days. Some of the deliberated derivatives of tetrazole are at present actively scientifically studied; some of them have biological activity that enables them to be studied further in the future as a drug for various biological activities. This review seeks to offer a comprehensive analysis of the efficacy and clinical advantage of biological activity for tetrazole derivatives.
This study was conducted to evaluate the efficiency of some chemicals and biological agents to induce systemic resistance (ISR) against to wheat common bunt disease caused by the two species of fungus Tilletia tritici (Bjerk.) Wint (T. caries (Dac.) Tul.) and T. laevis Kuhn (T. foetida (Wall.) Liro. Trails in the efforts to find an alternative, safe and environmentally friendly means to control the disease. Results of this study which carried out during two consecutive seasons for the years 2012 - 2013 and 2013 - 2014 at two different environmental locations. Seed treatment by (SA 100 and 200 mg/L, 500 ?–aminobutyric acid (BABA) and 1000 mg/L, Effective Microorganisms (EM1) 40 and 150 ml/kg seeds) have led to high significant redu
... Show MoreThe aim of the work is synthesis and characterization of bidentate ligand [dipotassium sodium7-((E)-2-(2-((Z)-1-carboxylatoethylideneamino)thiazol-4-yl)-2 (carboxylatemethoxyimino) acet amido)-8-oxo-3-vinyl-5- thia-1-azabicyclo[4.2.0] oct-2- ene-2- carboxylate] [Nak2L], from the reaction of cefixime with sodium pyruvet to produce the ligand [Nak2L], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [Nak2L] which was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [Nak2L] was used as a primary ligand while 8-hydroxy quinoline [Q] was used as a secondary ligand with metal ion M(Π).Where
... Show MoreNew series of imidazole[1,2-a]pyridine-sulfonamides was designed and synthesized from 2-aminopyridine, which was reacted with p-bromo phenacyl bromide in the present of MgO to produce the corresponding imidazole[1,2-a]pyridine, which was then reacted with chlorosulfonic acid to produce 2-(4-bromophenyl)imidazole[1,2-a]pyridine-3-sulfonyl chloride [2]. Following that, treatment of (2) with different amines using the grand method to generate imidazole [1,2-a] pyridine sulfonamides. All the synthesized compounds have been characterized by FTIR, 1HNMR and 13CNMR and C.H.N analysis. The DFT, POM analysis and molecular docking were carried out on for all final compounds to investigate drug like attributes, and the results revealed showed that the
... Show MoreThe aim of the work is synthesis and characterization of bidentate ligand [dipotassium sodium7-((E)-2-(2-((Z)-1-carboxylatoethylideneamino)thiazol-4-yl)-2 (carboxylatemethoxyimino) acet amido)-8-oxo-3-vinyl-5- thia-1-azabicyclo[4.2.0] oct-2- ene-2- carboxylate] [Nak2L], from the reaction of cefixime with sodium pyruvet to produce the ligand [Nak2L], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [Nak2L] which was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [Nak2L] was used as a primary ligand while 8-hydroxy quinoline [Q] was used as a secondary ligand with metal ion M(?).Where M(?) =
... Show MoreThis study aims to identify the role of forensic accounting in resolving banking disputes in the Iraqi environment, and to achieve this goal, the fiel
d survey method was used, as it is the most appropriate for studying the phenomenon in question and achieving its objectives. A sample of (50) male and female employees was selected, distributed among five banks listed on the Iraq Stock Exchange in the Baghdad governorate. The questionnaire tool prepared for this purpose was applied to them, which consisted of two main axes. The first axis included paragraphs of questions related to the importance of forensic accounting. The second axis relates to disputes At the end of the research, we reached a set of conclusions, the most import
... Show MoreThe aim of the research is to measure the change in the impact of the factors of the Corona pandemic on psychological sensitivity and COVID-19 phobia in a sample of Bisha University students and to detect the differences in the phobia (phobia) Covid-19 among the sample members in the measurement before the ban and after the ban was opened, in addition to the differences in psychological sensitivity of The sample has between sizes before and after the spread of the Corona pandemic, as well as the differences in them according to the gender variable (male, female). The researcher relied on the comparative approach. The scale of psychological sensitivity and COVID-19 phobia was applied to a sample of (62) male and female respondents.
... Show MoreWhen exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThis study came to discuss the subject of industries dependent on petrochemical industries in Iraq (plastic as a model) during the period 2005–2020, and the study concluded that the plastic industries contribute to areas of advancement and progress and opportunities to deal efficiently with the challenges posed by the new variables, the most important of which is the information revolution. communications and trade liberalization, and this is what contributes to the competitiveness of these industries. And because the petrochemical industry in Iraq has an active role in establishing plastic industrial clusters and clusters of micro, small, and medium industries by providing the necessary feedstock for these industries in various fields
... Show MoreAn edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show More