Formation of medium-ring heterocyclic compounds by two-directional ring-closing metathesis reaction
Journal Title: International Journal of Experimental Research and Review - Year 2021, Vol 26, Issue 3
Abstract
Ahmed, A., Ohler, E. and Mulzer, J. (2001). Synthesis of (S)-4-Methyl-3,6-dihydro-2H pyran-2-carbaldehyde by Twodirectional Ring Closing Metathesis: Application to the C27-C15-Fragment of Laulimalide. Synthesis. 2001(13): 2007-2010.
Authors and Affiliations
Titas Biswas
Analytical Method Development and Validation of RP-HPLC Method for Estimation of Pazopanib Drug Sample and It’s Dosage Form
The study focuses on developing and verifying a cost-effective Reverse Phase High-Performance Liquid Chromatography (RP-HPLC) technique for quantifying Pazopanib HCl in both bulk and tablet forms. The study aims to devel...
Metal-free one-pot oxidative conversion: Molecular Iodine Mediated Oxidation Organic Reactions
arious oxidative compounds such as aldehyde, ketone ester, and acids can be produced in large yields by an effective iodine-mediatedoxidative reaction of organic mol-ecules. Molecular iodine is a generall...
Effect of Borreria hispida Extract on SIRT1, HIF-1α, ET-1 and VEGFR-2 Gene Expression in NRK-52E Cells Subjected to Glucotoxicity
This study aimed to investigate the impact of Borreria hispida extract on gene expression in NRK-52E cells under conditions of glucotoxicity. Gene expression analysis was conducted using RT-PCR following the exposure of...
Effective weed management practices to control complex weed flora in different cultivars of hybrid and high yielding varieties of rice (Oryza sativa L.)
A field experiment was conducted during Summer and Kharif seasons of 2007-08 and 2008-09 at Bidhan Chandra Krishi Viswavidyalaya, Nadia, West Bengal, India to study the effect of hand weeding...
Phishing Detection: A Hybrid Model with Feature Selection and Machine Learning Techniques
Various phishing problems increase in cyber space with the progress of information technology. One of the prominent cyber-attacks rooted in social engineering is known as phishing. This malicious activity aims to deceive...