As they include both nucleophilic and electrophilic moieties on the same skeleton, enaminones are an important subclass of chemical compounds that contain conjugated NC=CC=O fragments. These active sites aid in the production of organic molecules containing linear or cyclic heteroatoms. Enaminones and the chemica1 compounds produced from them are both biologically active against the most dangerous bacteria. As a result, they have been utilized as starting materials for the synthesis of anti-inf1ammatory, antibacteria1, anticonvulsant, anticancer, anti-urease, anti-malaria1, optically luminescent, corrosion inhibition, and antitumor agents. Their synthesis has usually a terrific deal of interest and a plethora of synthetic paths have been narrated, including Lewis’s acids, P2O5/SiO2, Cu- nanoparticles, and heteropoly acid. Enaminone metal complexes have serval applications in industry and engineering. The definition, significance, and diverse applications of β-enaminone 1igands and their meta1 complexes are presented in this review study
New metal ion complexes were synthesized with the general formula; K[PtLCl4], [ReLCl4] and K[ML(Cl)2] where M = Pd(II), Cd(II), Zn(II) and Hg(II), from the Azo ligand (HL) [2-Hydroxy-3-((5-mercapto-1,3,4-thiadiazol-2-yl)diazenyl)-1-naphth aldehyde] (HL) the ligand was synthesized from (2-hydroxy-1-naphthaldehyde) and (5-amino-1,3,4-thiadiazole-2-thiol). The ligand and its metal complexes are characterized by phisco- chemical spectroscopic techniques (FT.IR, UV-Vis and Mass spectra, elemental analysis, molar conductivity, Atomic Absorption, Chloride contain and magnetic susceptibility). The spectral data suggest that the (HL) behaves as a bidentate ligand in all complexes. These studies revealed tetrahedral geometries for all metal complexes
... Show MoreIn this paper we introduce generalized (α, β) derivation on Semirings and extend some results of Oznur Golbasi on prime Semiring. Also, we present some results of commutativity of prime Semiring with these derivation.
The aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally
... Show MoreIn this work, we focused on studying 1,4-naphthoquinones and their derivatives, and knowing the methods of preparing them using different auxiliary agents and forming derivatives containing heterocyclic rings, active groups and saturated rings containing heterogeneous elements . In addition, due to their strong antibacterial, antifungal and anticancer activity, 1,4-naphthoquinone compounds biological importance and are considered a source of various pharmaceutical compounds.
There is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show More