As they include both nucleophilic and electrophilic moieties on the same skeleton, enaminones are an important subclass of chemical compounds that contain conjugated NC=CC=O fragments. These active sites aid in the production of organic molecules containing linear or cyclic heteroatoms. Enaminones and the chemica1 compounds produced from them are both biologically active against the most dangerous bacteria. As a result, they have been utilized as starting materials for the synthesis of anti-inf1ammatory, antibacteria1, anticonvulsant, anticancer, anti-urease, anti-malaria1, optically luminescent, corrosion inhibition, and antitumor agents. Their synthesis has usually a terrific deal of interest and a plethora of synthetic paths have been narrated, including Lewis’s acids, P2O5/SiO2, Cu- nanoparticles, and heteropoly acid. Enaminone metal complexes have serval applications in industry and engineering. The definition, significance, and diverse applications of β-enaminone 1igands and their meta1 complexes are presented in this review study
The aim of the work is synthesis and characterization of bidentate ligand [dipotassium sodium7-((E)-2-(2-((Z)-1-carboxylatoethylideneamino)thiazol-4-yl)-2 (carboxylatemethoxyimino) acet amido)-8-oxo-3-vinyl-5- thia-1-azabicyclo[4.2.0] oct-2- ene-2- carboxylate] [Nak2L], from the reaction of cefixime with sodium pyruvet to produce the ligand [Nak2L], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [Nak2L] which was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [Nak2L] was used as a primary ligand while 8-hydroxy quinoline [Q] was used as a secondary ligand with metal ion M(Π).Where
... Show MoreIn this paper we introduce generalized (α, β) derivation on Semirings and extend some results of Oznur Golbasi on prime Semiring. Also, we present some results of commutativity of prime Semiring with these derivation.
Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreThe main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show MoreThe tetradentate N2O2 Schiff base ligand, which is produced via the condensation reaction of 2-hydroxynaphthaldehyde with phthalohydrazide, is prepared in this work with a fair yield. The prepared ligand was characterized using a microanalysis technique (C.H.N), UV-vis, FTIR, 1H-,13C-NMR, mass spectrometry, and thermal gravimetric analysis (TGA). New complexes were synthesized by a reaction between ligand (N'1E,N'2Z)-N'1,N'2-bis((1-hydroxynaphthalen-2yl)methylene)phthalohydrazide and metal chloride of Co+2, Ni+2, and Zn+2 ions in absolute ethanol. The present complexes are also characterized by techniques such as C.H.N, UV-vis, FTIR, TGA, molar conductivity, atomic absorption, and magnetic moment measurements. The in vitro antimicro
... Show More