Preferred Language
Articles
/
YBdj4I8BVTCNdQwCGX_F
Synthesis and Characterization of Novel Schiff Bases, N-Acyl and Diazetines Derived from 3-((5-hydrazinyl-4-phenyl-4H-1,2,4- triazol-3-yl)methyl)-1H-indole
...Show More Authors

This work involves synthesis of some new heterocyclic compounds including 1, 3-diazetine. The new Schiff bases [VI] ad derived from 3-((5-hydrazinyl-4-phenyl-4H-1, 2, 4-triazol-3-yl) methyl)-1H-indole [V] which was synthesized by refluxing 5-((1H-indol-3-yl) methyl)-4-phenyl-4H-1, 2, 4-triazole-3-thiol [IV] with hydrazine hydrate in absolute ethanol and this amino compound [V] condensation with different aromatic aldehydes in absolute ethanol to yielded a new Schiff bases [VI] ad. N-acyl compounds [VII] ad were synthesized by addition reaction of acetyl chloride to imine group of Schiff bases in dry benzene. The new diazetine derivatives [VIII] ad synthesized by the reaction of N-acyl compounds [VII] ad with sodium azide in dimethylformamid at (55-60) 0C. All the synthesized compounds have been characterized by melting points, FTIR and 1HMNR spectroscopy

Publication Date
Sat Jun 15 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Study of Thermal Properties of Some Nematogenic Schiff’s Bases
...Show More Authors

The thermal properties of four nematogenic Schiff’s bases, n-butyl-to-n-heptyl of bis (4-n-alkyloxybenzylidine)-2,3,5.6- tetramethyl-1, 4-phenylenediamine, have been studied. The transition temperatures and enthalpies of transition were examined by differential scanning calorimeter (DSC). Several correlations were carried out; those included the relations between transition temperatures, enthalpies and entropies of transition with increasing the
number of carbon atoms in the terminal alkyl chains. In addition, new regular relations were found between the ratio of the enthalpies and of the entropies,  for noematic-isotropic transition and crystal-isotropic transition ( ΔΗΝ-i/AHC-I, ΔS

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on (m, n)-full stability Banach algebra modules relative to an ideal H of Am×n
...Show More Authors

In this paper the concept of (m, n)- fully stable Banach Algebra-module relative to ideal (F − (m, n) − S − B − A-module relative to ideal) is introducing, we study some properties of F − (m, n) − S − B − A-module relative to ideal and another characterization is given

Publication Date
Wed Sep 27 2023
Journal Name
Journal Of Optics
Studying the responsivity and detectivity of GO/PSi/n-Si photo detector via drop casting technique
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Sep 27 2023
Journal Name
Journal Of Optics
Studying the responsivity and detectivity of GO/PSi/n-Si photo detector via drop casting technique
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Mean-field Solution of the mixed spin-1 and spin-5/2Ising system with different single-ion anisotropies
...Show More Authors

The mixed-spin ferrimagnetic Ising system consists of two-dimensional sublattices A and B with spin values and respectively .By used the mean-field approximation MFA of Ising model to find magnetism( ).In order to determined the best stabile magnetism , Gibbs free energy employ a variational method based on the Bogoliubov inequality .The ground-state (Phase diagram) structure of our system can easily be determined at , we find six phases with different spins values depend on the effect of a single-ion anisotropies .these lead to determined the second , first orders transition ,and the tricritical points as well as the compensation phenomenon .

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
The Saudi Dental Journal
The impact of salivary lactoperoxidase and histatin-5 on early childhood caries severity in relation to nutritional status
...Show More Authors

View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Desalination And Water Treatment
Optimization of chemical oxygen demand removal from petroleum refinery wastewater by electrocoagulation using tubular electrochemical reactor with a novel design
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Inorganic Chemistry Communications
Entrapment of polyethylene terephthalate derived carbon in Ca-alginate beads for solid phase extraction of polycyclic aromatic hydrocarbons from environmental water samples
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref