The research included the preparation of cyclic compounds from thiazoles, imidazoles and oxazepines from the reaction of cyclization starting material that acts Schiff bases, which is a raw material in the formation of cyclic compounds from Schiff's(B1) by reaction of 4- aminobenzenesulfonylamide with 4-hydroxyacetophenone which can used to synthesized two lines. The first introducing the preparation of pyrazoles [B4, B5] from ester [B2], which derived to acid hydrazide[B3] with hydrazine hydrate and final pyrazoles obtained by the reaction with diethylmalonate and acetylacetone. The second including prepared the new 1,3-oxazepine1,5-dione derivatives[B6,B7,B8] from adding different anhydrides to the base[B1] as a seven membered ring ; tetrazole[B9]and thiazolidinone [B10] were synthesized from add sodium azide and thioglycolic acid to the same [B1] as a five members ring ; pyrimidine[B12,B13] were results after the reaction of azomthine moiety with acetyl chloride[B11]and then urea and thiourea to obtaine the [B12,B13] derivatives contain the 4,6-dion as a six members ring. These compounds were identified by using several analytical techniques such as FT- IR, 1HNMR, TLC, and 13CNMR. The biological activity of some compounds against four types of bacteria including staphylococcus aureus, bacillus subtilis (gram-positive) and E. coli, pseudomonas aeruginosa (gram-negative) and one type of fungal Candida albicans was examined and the results of the biological activity were compared with antibiotics (Ampicillin)
Abstract
The study aims to find out the degree of practicing professional leadership of the faculty’s deans, deputies, and heads of the scientific divisions at Al-Qaseem University. The study has adopted the descriptive analytical method. To achieve the objective of the study, the researcher developed a questionnaire consisting of (45) items distributed to six fields that were applied to a sample of (116) faculty deans, deputies, and the head of division at Al-Qaseem University. The results showed there is a high practicing degree of the study sample individuals of the professional leadership on the questionnaire’s fields as a whole, strategic thinking field came at the first rank, while the innovation, creat
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MorePrecision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us
... Show More
Background: Thyroid operation needs very meticulous haemostasis to have minimal morbidity and mortality.
Objectives: Assessment of harmonic knife in open thyroid surgery as anew haemostatic procedure .
Type of the study: Cross-sectional study.
Methods: This study had been conducted at Alkindy teaching hospital in Baghdad city from the 1st of May 2013 to the 1st of January 2017 on 229 goiterous patients who needs thyroidectomy(36 males,193 females),divided in 2 groups according to the haemostatic procedure used during their operations, Group A (15 males,85females)using the usual conventional surgery(
... Show MoreBACKGROUND: Coronavirus current pandemic (COVID-19) is the striking subject worldwide hitting countries in an unexplained non-universal pattern. Bacillus Calmette–Guérin (BCG) vaccine was an adopted recent justification depending on its non-specific immune activation properties. Still the problem of post-vaccine short duration of protection needs to be solved. The same protective mechanism was identified in active or latent tuberculosis (TB). For each single patient of active TB, there are about nine cases of asymptomatic latent TB apparently normal individuals living within the community without restrictions carrying benefits of immune activation and involved in re-infection cycles in an excellent example of repeated immunity tr
... Show MoreIn this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets
This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show More