ABSTRACT: Oxadiazole ring is a heterocyclic molecule with an oxygen and two nitrogen atoms spread throughout its five-membered structure. There are four different isomers that have been discovered, Because of their wide applications in a range of sectors, including medications . Some of these biological activity are; anticonvulsant capacity, anticancer as well, antibacterial, antiviral, antifungal, antimalarial, antitubercular, anti-asthmatic, antidepressant, antidiabetic, antioxidant, antiparkinsonian, analgesic and anti-inflammatory, are just some of the therapeutic uses that have drawn attention to drug candidates containing an oxadiazole moiety. This review, we will examine the various methods of oxadiazole synthesis. The molecular docking of some oxadiazole compounds has been studied to investigate the active derivatives and to evaluate their activity. The synthesis of the oxadiazole ring has sparked a lot of attention since then. A large number of oxadiazole derivatives, as well and methods, were reported New antimicrobial drugs have been developed from a number of different areas in recent years in an effort to reduce the prevalence of drug-resistant bacteria. Furthermore, this review touches upon the importance of structural modification in fine-tuning the biological activities of 1,3,4-oxadiazole derivatives. By altering the substituents and the position of functional groups, researchers can tailor the pharmacological properties to target specific diseases or conditions, making them highly versatile and attractive in drug discovery.
Significant advances in the automated glaucoma detection techniques have been made through the employment of the Machine Learning (ML) and Deep Learning (DL) methods, an overview of which will be provided in this paper. What sets the current literature review apart is its exclusive focus on the aforementioned techniques for glaucoma detection using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines for filtering the selected papers. To achieve this, an advanced search was conducted in the Scopus database, specifically looking for research papers published in 2023, with the keywords "glaucoma detection", "machine learning", and "deep learning". Among the multiple found papers, the ones focusing
... Show MoreBlock cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreHeterocyclic compounds are employed in many applications, and numerous researchers have created liquid crystals by adding heterocyclic to the structures of these molecules. This work includes the synthesis and characterization of new compounds that contain 5H-thiazolo [4,3-b][1,3,4] thiadiazol united in multiple steps, starting with the synthesis of the aldehyde compound [I] by reaction chloro ethyl acetate with 4-hydroxybenzaldehyde in the presence of ethanol and potassium carbonate, followed by reactions with thiosemicarbazide, mercapto acetic acid in sulphuric acid to produce compound [II] then reflux compound [II] with hydrazine hydrate to product compound [III], after that reaction the later compound with nalkoxybenzaldehyde [IV]n and
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreNearly a century and a half has passed since Sarah Orne Jewett published her much anthologized short story “A White Heron” (1886), but commentators on the tale missed one of the most important points in the text. It is the story’s similarity to the traditional Euro-centric fairy tale of “Little Red Riding Hood”. As an author, writing at the end of the ninetieth century, a time that witnessed the demise of the Romantic movement in America and the beginning of the age of Realism, Jewett did not romanticize her characters, despite the idyllic landscape in which “A White Heron” is set. Her story can be analyzed as a text that aims at disseminating ecological awareness among her young readers. This study focuses on Jewett
... Show MoreA OUI,tiper of LWW lig_;:tnds .of ppen sides. of Bis-'Oxad1azoJe· and·
Bis-triazole derived from dichloroetbane and [Bis 0-ohloro et!:ty)
= :=:: =
ether)] (BCEE)' wersynthesi:zed. These inelude: 1, 4- bis[-3{thio- 2 -
. (Chloro·ethyl)l1 1;4 - oxadiazole ......$yl] butane (-L I);1 4 B'is {phenl-
3{th
... Show MoreDuring the two last decades ago, audio compression becomes the topic of many types of research due to the importance of this field which reflecting on the storage capacity and the transmission requirement. The rapid development of the computer industry increases the demand for audio data with high quality and accordingly, there is great importance for the development of audio compression technologies, lossy and lossless are the two categories of compression. This paper aims to review the techniques of the lossy audio compression methods, summarize the importance and the uses of each method.
One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an
... Show More