The preparation of the phenanthridine derivative compound was achieved by adopting an efficient one-pot synthetic approach. The condensation of an ethanolic mixture of benzaldehyde, cyclohexanone and ammonium acetate in a 2:1:1 mole ratio resulted in the formation of the title compound. Analytical and spectroscopic techniques were used to confirm the nature of the new compound. A mechanism for the formation of the phenanthridine moiety that is based on three steps has been suggested
A New Mannich base [N-(4-morpholinomethyl)-1,8-naphthalimide] (L), was synthesized and characterized by C.H.N analysis, FTIR, UV-Vis and 1HNMR spectral analysis. Metal ion complexes of (L) with Pt(IV), Rh(III), Ru(III) and Pd(II) ions were prepared and characterized by FT-IR, and UV-Vis spectroscopy, elemental analysis (C.H.N), flame atomic absorption techniques as well as magnetic susceptibility and conductivity measurements. The results showed that metal ion complexes for all complexes were found in [1:2] [M:L] ratio except for Pd(II) complex which was found in [1:1] [M:L] ratio. Hyperchem-8 program has been used to predict structural geometries of the (L) and it's complexes in gas phase. The electrostatic potential (EP) of the (L) was
... Show MoreAll new compounds synthesized by many reactions starting from a product the compounds [I]a,b from reaction of 3-phenylenediamine or 4-phenylenediamine with chloroacetyl chloride, then the compounds [I]a,b reacted with potassium thiocyanate to yield compounds [II]a,b. While the compounds[III]a,b yield from reacted the compounds [I]a,b with sodium azide then the compounds [III]a,b reacted 1,3-dipolar cycloaddition reaction with acrylic acid to give compounds [IV]a,b and the later compounds reacted with phenylene diamine to product benzimidazole compounds [V]a,b . In addition to synthesized acid chloride compounds [VI]a,b by reacted the compounds [IV]a,b with thionyl chloride .Finally reacted the compounds [VI]a,b with different aromatic amine
... Show MoreAddressed the problem of the research is marked (technical openness in the formation of post-modernism - Pop Art an Example) the nature of the technical expansion of the output artifacts postmodern, and the nature of the raw materials taken as components of its sensual. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. From then select the search goal (revealed openness to hire technical material in the art of Pop Art), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indi
... Show MoreCloud computing has gained considerable attention in academia and industry in recent years. The cloud facilitates data sharing and enables cost efficiency, thus playing a vital role today as well as for the foreseeable future. In this paper, a brief discussion the application of multi-tenant and load-balancing technologies to cloud-based digital resource sharing suitable for academic and digital libraries is presented. As a new paradigm for digital resource sharing, a proposal of improving the current user service model with private cloud storage for other sectors, including the medical and financial fields is offered. This paper gives a summary of cloud computing and its possible applications, combined with digital data optim
... Show MoreCoupling reaction of 2-amino benzoic acid with 8-hydroxy quinoline gave bidentate azo ligand. The prepared ligand has been identified by Microelemental Analysis,1HNMR,FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (ZnII,CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes have been characterized by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range
... Show MoreCoupling reaction of 2-amino benzoic acid with 8-hydroxy quinoline gave bidentate azo ligand. The prepared ligand has been identified by Microelemental Analysis,1HNMR,FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (ZnII,CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes have been characterized by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range
... Show MoreCoupling reaction of 2-amino benzoic acid with 8-hydroxy quinoline gave bidentate azo ligand. The prepared ligand has been identified by Microelemental Analysis,1HNMR,FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (ZnII,CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes have been characterized by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration ra
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show More