Objective: Schiff’s and Mannich bases of isatins are an important group of heterocyclic compounds which are of great importance in medicinal chemistry as antimicrobial agents. In the vision of these facts, new bis-Schiff bases and Mannich bases of isatins were synthesized. Methods: Three different bis-Schiff bases (3a-c) have been synthesized by reacting isatin, 5-fluoroisatin and 5-methoxy isatin with thiophene-2- carboxaldehyde using hydrazine hydrate to link between the carbonyl compounds, and then these bis- Schiff bases were condensed with two different secondary amines (piperidine and morpholine) separately, and formaldehyde to form the Mannich bases (4a-c and 5a-f), respectively. Results: The structures of the newly synthesized compounds were confirmed using (Fourier- transform infrared) FTIR, 1H-nuclear magnetic resonance spectroscopy (¹H-NMR) and CHNS elementary analysis. All the synthesized bis-Schiff bases and Mannich bases were screened for their antimicrobial activities. Conclusion: The target compounds showed convincing antibacterial activity, whereas their antifungal activity was more potent, and the most active ones were Mannich bases of 5-methoxy isatin derivatives (4c and 5c) against Candida albicans.
The Sonic Scanner is a multifunctional instrument designed to log wells, assess elastic characteristics, and support reservoir characterisation. Furthermore, it facilitates comprehension of rock mechanics, gas detection, and well positioning, while also furnishing data for geomechanical computations and sand management. The present work involved the application of the Sonic Scanner for both basic and advanced processing of oil-well-penetrating carbonate media. The study aimed to characterize the compressional, shear, Stoneley slowness, rock mechanical properties, and Shear anisotropy analysis of the formation. Except for intervals where significant washouts are encountered, the data quality of the Monopole, Dipole, and Stoneley modes is gen
... Show MoreMany athletes believe that it enhances the level of performance during training and competition, in addition to compensating for fluids during exercise when the levels of temperature and humidity in the atmosphere rise during the athlete's intensive training, as it increases the requirements for fluid compensation to avoid the risk of potential thermal disorders. If training continues for more than an hour causing fatigue, athletes are advised to drink carbohydrate drinks that quickly convert to glucose in the blood, while sodium should be included in the fluids consumed during exercise or matches that last more than (1-2 hours). The effect of drinking a drink containing 12% carbohydrates and electrolytes before each half of a simul
... Show MoreThe aim of this study was to know the inhibition activity of squeezed grape waste extract on Bacillus stearpthermophilus by using three different tempretures degree 40, 60 and 80c, in order to reduce the time exposure of food for preservation. This study include two branchs: First: isolation and identification of Bacillus stearothermophilus from soil, 5 sample were collected from the soil of the college agriculture/Baghdad university. Samples were cultured on nutrient agar, microscopic and culturing tests were conducted and many biochemical tests were done. The isolates were cultivated at 55 c and 65 c for differentiate it from Bacillus coagulans which is can't grow at 65 co. The c
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreIn the present work a theoretical analysis depending on the new higher order . element in shear deformation theory for simply supported cross-ply laminated plate is developed. The new displacement field of the middle surface expanded as a combination of exponential and trigonometric function of thickness coordinate with the transverse displacement taken to be constant through the thickness. The governing equations are derived using Hamilton’s principle and solved using Navier solution method to obtain the deflection and stresses under uniform sinusoidal load. The effect of many design parameters such as number of laminates, aspect ratio and thickness ratio on static behavior of the laminated composite plate has been studied. The
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIn this paper, a new form of 2D-plane curves is produced and graphically studied. The name of my daughter "Noor" has been given to this curve; therefore, Noor term describes this curve whenever it is used in this paper. This curve is a form of these opened curves as it extends in the infinity along both sides from the origin point. The curve is designed by a circle/ ellipse which are drawing curvatures that tangent at the origin point, where its circumference is passed through the (0,2a). By sharing two vertical lined points of both the circle diameter and the major axis of the ellipse, the parametric equation is derived. In this paper, a set of various cases of Noor curve are graphically studied by two curvature cases;
... Show MoreThis work was included external morphological study of horse fly Tabanus indrae Hauser 1939 new record in Iraq, which belongs to family: Tabanidae order: Diptera. The study was involved the most important taxonomic external characters of the: head, thorax, abdomen and their appendages which are: antenna, maxillary palp, wings, legs, spotting in coloring pattern and female genitalia of abdomen