Both traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs allow for the recording of magnetic shielding from the bent ring levels of [n]pCPs, while CGs provide tubular magnetic shielding scan (TMSS) maps detailing the magnetic shielding from a cylindrical region above and below the ring frame. Our findings suggest that smaller [n]pCPs with n < 6 exhibit deviations in the magnetic shielding above and below the ring, indicating a broken electron delocalization under the ring. In contrast, larger [n]pCPs tend to behave similarly to benzene in terms of magnetic shielding. Moreover, we found that shorter polymethylene chains of [n]pCPs exhibit significantly higher magnetic shielding interactions with the ring. Both of the above techniques offer new and promising tools for characterizing nonplanar aromatic compounds, thereby contributing to a deeper understanding of their magnetic and electronic properties.
This work contain many steps starting from esterification of isophthalic acid to yield diester compound [I] which was converted to their acid hydrazide [II], then the later compound reacted with ethylacetoacetate to yield pyrazol-5-one compound [III]. Afterword added acetyl chloride to give the compound [IV], the reaction of this compound with theiosemicarbazide led to produce a new carbothioamide compound [V], which was reacted with ethyl chloro acetate to yield the thioxoimidazolidin compound [VI]. The condensation reactions of this compound with different substituted aldehyde give new alkene derivatives [VII] ad. The synthesized compounds were characterized by melting points, FT-IR, 1H-NMR and Mass spectroscopy.
In this paper the new starting material 2-(5-chloro-1H-benzo[d]imidazole-2-yl) aniline (1) was synthesized by the condensation reaction of 4-chloro-o-phenylenediamine and anthranilic acid .The new Mannich base derivatives were synthesized using formaldehyde and different secondary amines to synthesize a new set of benzimidazole derivatives(2-5). Also, the new Schiff-base derivatives (6-10) were synthesized from the reaction of compound (1) with various aromatic aldehydes and the closure-ring was done successfully using mercapto acetic acid to get the new thiazolidine derivatives(11-12).These new compounds were characterized using some physical techniques like:FT-IR Spectra and 1HNMR Spectra.
Advanced drug delivery systems offer undeniable benefits for drug delivery. In the past three decades, new methods have been proposed to develop a novel carriers for drug delivery. Nowadays, the major goal is to maximize therapeutic benefit while minimizing side effects. Drug delivery technique is clearly shifting from the micro to nanoscale. Nano-drug delivery systems (NDDSs) are the most promising approach utilized to improve the accuracy of drug delivery and the efficacy of drugs.In this narrative review article, we evaluate how delivery challenges associated with commercial marketed products and discuss newer DDS is being carried out to overcome these challenges .Different colloidal carrier systems such as carbon nanotube ,li
... Show MoreThis work contain many steps starting from esterification of isophthalic acid to yield diester compound [I] which was converted to their acid hydrazide [II], then the later compound reacted with ethylacetoacetate to yield pyrazol-5-one compound [III]. Afterword added acetyl chloride to give the compound [IV], thereaction of this compound with theiosemicarbazide ledto produce a new carbothioamide compound [V], Which was reacted with ethyl chloro acetate to yield thethioxoimidazolidin compound [VI]. The condensation reaction of this compound with different substituted aldehyde give new alkene derivatives[VII]a-d. The synthesized compounds were characterized by melting points , FT-IR ,1H-NMR and Mass spectroscopy .
Novel heterocyclic polyimide 5(a,b) have been synthesized based on polyacrylic backbone. The synthetic route start with nucleophilic substitution of 2-amino, or 4-amino, pyridine 1(a,b) to the polyacryloyl chloride afforded poly substituted amide 2(a,b). Another nucleophilic substitution were carried with adipoyl chloride to form polyimide chloride 3(a,b). Treatment of 3(a,b) with hydrazine hydrate afforded acid hydrazide polyimide 4(a,b), which upon cyclocondensation with carbon disulfide gave the target heterocyclic polyimide. The synthesized compounds were identified by spectroscopic methods: FT-IR, 1H-NMR and 13C-NMR.
In this paper, a new procedure is introduced to estimate the solution for the three-point boundary value problem which is instituted on the use of Morgan-Voyce polynomial. In the beginning, Morgan-Voyce polynomial along with their important properties is introduced. Next, this polynomial with aid of the collocation method utilized to modify the differential equation with boundary conditions to the algebraic system. Finally, the examples approve the validity and accuracy of the proposed method.
In this research paper, we explain the use of the convexity and the starlikness properties of a given function to generate special properties of differential subordination and superordination functions in the classes of analytic functions that have the form in the unit disk. We also show the significant of these properties to derive sandwich results when the Srivastava- Attiya operator is used.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More