This work includes two steps of synthesis, the first one is the synthesis of indole which was prepared according to literature of the reaction of phenyl hydrazine with acetaldehyde in glacial acetic acid afforded phenyl hydrazone of acetaldehyde , this product was fused with zinc chloride to give the indole.Reaction of cyclohexanone with phenyl hydrazine using the same procedure for the preparing giving 1,2,3,4-Tetrahydrocarbazole.Second step involved synthesis of a series of (17) of mannich bases derivatives of indole and 1,2,3,4-Tetrahydrocarbazle. Mannich reaction involves the condensation of aldehyde usually formaldehyde with different secondary amine and with compound containing an activated hydrogen.The reaction illustrated by the following equation :R2NH+HCHO+RH?R2N-CH2-R+H2O These compounds were characterized by U.V , FT-IR and 1H-NMR spectra for two compounds. The secondary amines that used to prepare mannich bases are:N-methyl –N-phenyl amine, N,N-dimethyl amine, N,N- diphenyl amine, N-ethyl –N- phenyl amine, N,N-di-n-propyl amine, pyrrolidine, morpholine, N- methyl pipyridine, N,N-dibenzyl amine, N,N-di –n-butyl amine and N,N-di ethyl amine.
In this work the fabrication and characterization of poly(3-hexylthiophene) P3HT-metallic nanoparticles (Ag, Al). Pulsed Laser Ablation (PLA) technique was used to synthesis the nanoparticles in liquid. The Fourier Transformer Infrared (FTIR) for all samples indicate the chemical interaction between the polymer and the nanoparticles. Scanning Electron Microscopic (SEM) analysis showed the particle size for P3HT-AgNps samples between 44.50 nanometers as well the spherical structure. While for P3HT-AlNps samples was flakes shape. Energy Dispersive X-ray (EDX) spectra show the existing of amount of metallic nanoparticles.
Precision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us
... Show More
Background: Thyroid operation needs very meticulous haemostasis to have minimal morbidity and mortality.
Objectives: Assessment of harmonic knife in open thyroid surgery as anew haemostatic procedure .
Type of the study: Cross-sectional study.
Methods: This study had been conducted at Alkindy teaching hospital in Baghdad city from the 1st of May 2013 to the 1st of January 2017 on 229 goiterous patients who needs thyroidectomy(36 males,193 females),divided in 2 groups according to the haemostatic procedure used during their operations, Group A (15 males,85females)using the usual conventional surgery(
... Show MoreAbstract
The problem with the search at the reduction of adoption of new products, as there are three hypotheses of research have been formulated , the first one is no significant correlation between the religious and differences to customers and adopt new products, and This Study Aimed To Investigate The Relationship Between Religious differences for customers And New Products Adoption, Applied On Arab Mall Commercial Customers/ Egypt, an Analytical Model Is Developed As Guideline To Test The The Relationship Between Religious differences for customers And New Products Adoption, Aquantative Method With Deductive Approach Were Chosen In This Research . In Order To Collect Primary Data, A questionnaire Is
... Show MoreIn this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets
Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.
An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo
... Show More
Viscosity is one of the most important governing parameters of the fluid flow, either in the porous media or in pipelines. So it is important to use an accurate method to calculate the oil viscosity at various operating conditions. In the literature, several empirical correlations have been proposed for predicting crude oil viscosity. However, these correlations are limited to predict the oil viscosity at specified conditions. In the present work, an extensive experimental data of oil viscosities collected from different samples of Iraqi oil reservoirs was applied to develop a new correlation to calculate the oil viscosity at various operating conditions either for dead, satura
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show More