In this research four steps of the new derivatives of Naproxen drug have been made which are known as a high medicinal effectiveness; the first step involved converting Naproxen into the corresponding ester (A) by reaction Naproxen with methanol absolute in presence H2SO4. While the second step involved treatment methyl Naproxen ester (A) with hydrazine hydrate 80% in presence of ethanol .The third reaction requires synthesis of Schiff bases (C1-C10) by condensation. of Naproxen hydrazide (B) with many substituted aromatic aldehydes . Finally, the fourth step synthesized new tetrazole derivatives ( D1- D10) by the reaction of the prepared Schiff bases (in the third step) with Sodium azide in THF as a solvent .The prepared compounds were characterized by physical properties ,(FT-IR) ,UV, and somewhat of them by 1H-NMR, 13C-NMR spectroscopy.
In the present work, steady, laminar natural convection in nonrectangular enclosures is analyzed numerically with and without fin. Vertical walls insulated while horizontal walls maintained isothermal at different temperature and the fin was placed on horizontal surface. The length of fin was equal (B/L=0.22, 0.44 and 0.66) and thickness of fin was constant. Various parameters are studied: Rayleigh number (from 104 to 107 ), Prandtl number (0.7), number of fin change from (1-3) and aspect ratio (H/L= 0.15 to 0.5). The problem is formulated in terms of the vorticity-stream function procedure. A numerical solution based on program in Fortran 90 with Tec plot program. The finite difference method is used. Streamlines and isotherms are prese
... Show MoreThis search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreAbstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreInvestigating the strength and the relationship between the Self-organized learning strategies and self-competence among talented students was the aim of this study. To do this, the researcher employed the correlation descriptive approach, whereby a sample of (120) male and female student were selected from various Iraqi cities for the academic year 2015-2016. the researcher setup two scales based on the previous studies: one to measure the Self-organized learning strategies which consist of (47) item and the other to measure the self-competence that composed of (50) item. Both of these scales were applied on the targeted sample to collect the required data