As they include both nucleophilic and electrophilic moieties on the same skeleton, enaminones are an important subclass of chemical compounds that contain conjugated NC=CC=O fragments. These active sites aid in the production of organic molecules containing linear or cyclic heteroatoms. Enaminones and the chemica1 compounds produced from them are both biologically active against the most dangerous bacteria. As a result, they have been utilized as starting materials for the synthesis of anti-inf1ammatory, antibacteria1, anticonvulsant, anticancer, anti-urease, anti-malaria1, optically luminescent, corrosion inhibition, and antitumor agents. Their synthesis has usually a terrific deal of interest and a plethora of synthetic paths have been narrated, including Lewis’s acids, P2O5/SiO2, Cu- nanoparticles, and heteropoly acid. Enaminone metal complexes have serval applications in industry and engineering. The definition, significance, and diverse applications of β-enaminone 1igands and their meta1 complexes are presented in this review study
A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreRotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreBackground: It's believed that HBD-3 is involved in the tissue remodeling process of articular cartilage. Also, HBD-3 has anti-inflammatory properties. Objectives: The purpose of this study is to assay human beta-defensine-3 (HBD-3) in serum from rheumatoid arthritis (RA) patients and investigate its correlation with proinflammatory cytokines. Methods: In this case-control study, fifty-eight RA patients were aged 20–65 years, and 29 age-matched healthy subjects (HS) had no inflammatory rheumatic diseases. The disease activity score-28 joint erythrocyte sedimentation rate (DAS28-ESR) was used to measure RA activity. CRP, ACPA, HBD-3, TNF-α, and IL-1β were assessed using the enzyme-linked immunosorbent assay technique (ELISA). Res
... Show MoreOne of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an
... Show More