New 2-amino thiazole ,oxodiazole, sulphonilamide and diazin derivatives of N-(α-chloro aceto)-3-(tolyl imino)-5-bromo-2-oxo-indole(2) have been synthesized .The preparation process started by the reaction of 5-bromo isatin with P-toluidine in the presence of glacial acetic acid and dimethylformamide(DMF) as a solvent to give 3-(tolyl imino)5-bromo-1H-indole-2-one.(1), Compound (1) with sodium hydride in dimethylformamide(DMF) at 0C0 gave a suspension of the sodium salt of Schiff base derivative and subsequent reaction with monochloroacetylchloride obtained the intermediate compound(2).Compound(2) was reacted with different reagents in four routes.The first route involved direct reaction with substituted 2-aminobenzothiazole under certain condition to give new compounds (3-8).The second route involved condensation compound(2) with 5-substiuted -2-amino 1,3,4-oxodiazole in the presence of anhydrous potassium carbonate to give new compounds(9-13),while the third route involved condensation compound (2) with para-chloro sulphonyl aniline to give a compound (14) which was treated to give new sulphonylamide compounds (15-19) with different primary aromatic amines in the fourth route compound (2) was treated with hydrazine hydrate in dimethylformaid(DMF) to give compound (20) ,the hydrazide derivatives(20)was reacted with different acid anhydrides in acetic acid as a solvent to give compounds (21-25). The Structure of newly synthesized compounds were identified by spectral methods [FTIR,1H-NMR]and measurements some of it’s physical properties and some specific reaction. Furthermore were studied the effects of the preparing compounds on some strains of bacteria and one yeast.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreIntestinal mucositis is referring to inflammatory or ulcerative lesions of the oral or gastrointestinal tract; one of the main reasons is treatment with cancer chemotherapy. The prodrug Irinotecan is converted by carboxylesterase to the active metabolite SN-38, conjugated by UGT enzyme to SN-38G and then deconjugated by ?-glucoronidase produced by intestinal bacterial flora to produce SN-38. Irinotecan induces intestinal mucositis and diarrhea due to increased concentration of its active metabolite (SN-38).To evaluate the protective effect of carvone, I.P injection of (75mg/kg/day) of irinotecan for 4 days to induce intestinal mucositis, carvone administered to mice orally for 6 days starting from day 1. Results showed that carvone (50mg
... Show MoreCollapsible soil has a metastable structure that experiences a large reduction in volume or collapse when wetting. The characteristics of collapsible soil contribute to different problems for infrastructures constructed on its such as cracks and excessive settlement found in buildings, railways channels, bridges, and roads. This paper aims to provide an art review on collapse soil behavior all over the world, type of collapse soil, identification of collapse potential, and factors that affect collapsibility soil. As urban grow in several parts of the world, the collapsible soil will have more get to the water. As a result, there will be an increase in the number of wetting collapse problems, so it's very important to com
... Show MoreThis paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl
... Show MoreExcessive torque and drag can be critical limitation during drilling highly deviated oil wells. Using the modeling is regarded as an invaluable process to assist in well planning and to predict and prevent drilling problems. Identify which problems lead to excessive torque and drag to prevent cost losses and equipment damage. Proper modeling data is highly important for knowing and prediction hole problems may occur due to torque and drag and select the best method to avoid these problems related to well bore and drill string. In this study, Torque and drag well plan program from landmark worldwide programming group (Halliburton Company) used to identify hole problems.one deviated well in Zubair oil fields named, ZB-250 selected for
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreBackground: Hypothyroidism is a decrease in the production of the thyroid hormones and leads to gland dysfunction. Ashwagandha extract was used as an ayurvedic treatment and supposed to be as antihypothyroidism agent.
Objectives: to investigate the impact of ashwagandha (Ash) extract on propylthiouracil (PTU)-induced hypothyroidism in rats.
Subjects and Methods: The rats were divided into three groups, control group, PTU (hypothyroid) group (6mg/kg/day by oral route), PTU (6mg/kg/day by oral route) +Ash (50mg/kg/day by oral route) treated group. All treatment continued for
... Show More