Aromatic Schiff-bases are known to have antibacterial activity, but most of these compounds are sparingly soluble in water. The present work describes the synthesis of new Schiff-bases derived from branched aminosugars. Treatment of 3-Amino-3-Cyano-3-Deoxy-1,2:5,6-Di-O-Isopropylene-α-D-Allofuranose (1) with the aldehydes (2) under reflux in methanol afforded the Schiff-bases (3) in good yields. The new Schiff-bases were in accord with their NMR, IR spectral data and elemental analysis.
A new method for determination of allopurinol in microgram level depending on its ability to reduce the yellow absorption spectrum of (I-3) at maximum wavelength ( ?max 350nm) . The optimum conditions such as "concentration of reactant materials , time of sitting and order of addition were studied to get a high sensitivity ( ? = 27229 l.mole-1.cm-1) sandal sensitivity : 0.0053 µg cm-2 ,with wide range of calibration curve ( 1 – 9 µg.ml-1 ) good stability (more then24 hr.) and repeatability ( RSD % : 2.1 -2.6 % ) , the Recovery % : ( 98.17 – 100.5 % ) , the Erel % ( 0.50 -1.83 % ) and the interference's of Xanthine , Cystein , Creatinine , Urea and the Glucose in 20 , 40 , 60 fold of analyate were also studied .
In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreGreen synthesis methods have emerged as favorable techniques for the synthesis of nano-oxides due to their simplicity, cost-effectiveness, eco-friendliness, and non-toxicity. In this study, Nickel oxide nanoparticles (NiO-NPs) were synthesized using the aqueous extract of Laurus nobilis leaves as a natural capping agent. The synthesized NiO-NPs were employed as an adsorbent for the removal of Biebrich Scarlet (BS) dye from aqueous solution using adsorption technique. Comprehensive characterization of NiO-NPs was performed using various techniques such as atomic force microscopy (AFM), Fourier transform infrared (FTIR), X-ray diffraction (XRD), Brunauer-Emmett and Teller (BET) analysis, and scanning electron microscopy (SEM). Additionally, o
... Show MoreThe work included external morphological study of the frog hopperNeophilaenuslineatus(Linnaeus), 1758 which belongs to the family Cercopidae of order Homoptera. The studied species is regarded as new record to Iraqi funa. The study involved with the most important toxonomic external characters such as the head, thorax, abdomen and some of their appendages in addition to male and female genitalia
This article reveals the first record of the parasitoid wasp, Monodontomerus obscurus Westwood (Hymenoptera, Torymidae) from Iraq. A total of 27 specimens were emerged from mud nests of sphecoid wasp of Sceliphron sp. (Hymenoptera, Sphecidae), that collected from a wall at a residential garden in Dohuk province. A short morphological description is presented.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More