Objective: Schiff’s and Mannich bases of isatins are an important group of heterocyclic compounds which are of great importance in medicinal chemistry as antimicrobial agents. In the vision of these facts, new bis-Schiff bases and Mannich bases of isatins were synthesized. Methods: Three different bis-Schiff bases (3a-c) have been synthesized by reacting isatin, 5-fluoroisatin and 5-methoxy isatin with thiophene-2- carboxaldehyde using hydrazine hydrate to link between the carbonyl compounds, and then these bis- Schiff bases were condensed with two different secondary amines (piperidine and morpholine) separately, and formaldehyde to form the Mannich bases (4a-c and 5a-f), respectively. Results: The structures of the newly synthesized compounds were confirmed using (Fourier- transform infrared) FTIR, 1H-nuclear magnetic resonance spectroscopy (¹H-NMR) and CHNS elementary analysis. All the synthesized bis-Schiff bases and Mannich bases were screened for their antimicrobial activities. Conclusion: The target compounds showed convincing antibacterial activity, whereas their antifungal activity was more potent, and the most active ones were Mannich bases of 5-methoxy isatin derivatives (4c and 5c) against Candida albicans.
A multivariate control chart is measured by many variables that are correlated in production, using the quality characteristics in any product. In this paper, statistical procedures were employed to find the multivariate quality control chart by utilizing fuzzy Hotelling test. The procedure utilizes the triangular membership function to treat the real data, which were collected from Baghdad Soft Drinks Company in Iraq. The quality of production was evaluated by using a new method of the ranking function.
The recurrent somatic variations in
The aim of the study was to detect the frequency of R132 mutations in the
Background: COVID-19 is a disease that started in Wuhan/China in late 2019 and continued through 2020 worldwide. Scientists worldwide continue to research to find vaccines, treatments, and medication for this disease. Studies also conenue to find the pathogenicity and epidemiology mechanisms. Materials and Methods: In this work, we analyzed cases obtained from Alshifaa center in Baghdad/Iraq for 23/2/2020-31/5/2020 with total instances of 797, positive cases of 393, and death cases of 30. Results: Results showed that the highest infection cases were among people aged between 41-45. Also, it was found that males' number of cases was more than females. In contrast, death cases were significantly higher in males than females. It was not
... Show MoreSami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both ar
... Show MoreThe existing investigation explains the consequence of irradiation of violet laser on the structure properties of MawsoniteCu6Fe2SnS8 [CFTS] thin films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser. when the received films were processed by continuous red laser (700 nm) with power (>1000mW) for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time (0,30,45,60,75,90 min) respectively at room temperature.. The XRD diffraction gave polycrysta
... Show MoreIn this paper, we introduced some fact in 2-Banach space. Also, we define asymptotically non-expansive mappings in the setting of 2-normed spaces analogous to asymptotically non-expansive mappings in usual normed spaces. And then prove the existence of fixed points for this type of mappings in 2-Banach spaces.
This paper presents a new design of a nonlinear multi-input multi-output PID neural controller of the active brake steering force and the active front steering angle for a 2-DOF vehicle model based on modified Elman recurrent neural. The goal of this work is to achieve the stability and to improve the vehicle dynamic’s performance through achieving the desired yaw rate and reducing the lateral velocity of the vehicle in a minimum time period for preventing the vehicle from slipping out the road curvature by using two active control actions: the front steering angle and the brake steering force. Bacterial forging optimization algorithm is used to adjust the parameters weights of the proposed controller. Simulation resul
... Show MoreThe hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre
... Show MoreNS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.