One of the most important , compound which have active hydrogen is the compound possessing (thiol group) Biphenyl-4,4-dithiol is agood example utilized in a wide field for preparation mannich bases , avariety of new acetylenic mannich bases have been Synthesized and all proposed structure were Supported by FTIR , 1H – NMR, 13C-NMR , Elemental analysis and microbial study .
The reaction of L-ascorbic acid with the tirchloroacetic acid in the presence of potassium hydroxide gave new product Bis[O,O-2,3;O,O-5,6(chlorocarboxylicmethyliden)]Lascorbic acid (H2L) which was isolated and characterized by 1H,13C-NMR, elemental analysis (C,H,N), UV-Visible and Fourier Transform Infrared (FTIR). The complexes of the ligand (H2L) with metal ions, M+2= (Cu, Co, Ni, Cd and Hg) were synthesized and characterized by FTIR, UV-Visible, molar conductance, atomic absorption, magnetic susceptibility and the molar ratio. The analysis evidence showed the binding of the metal ions with (H2L) through the bicarboxylato group manner resulting in six-coordinated metal ion. The TLC for (H2L) and complexes showed one spot for eac
... Show MoreCarbon dioxide (CO2) capture and storage is a critical issue for mitigating climate change. Porous aromatic Schiff base complexes have emerged as a promising class of materials for CO2 capture due to their high surface area, porosity, and stability. In this study, we investigate the potential of Schiff base complexes as an effective media for CO2 storage. We review the synthesis and characterization of porous aromatic Schiff bases materials complexes and examine their CO2 sorption properties. We find that Schiff base complexes exhibit high CO2 adsorption capacity and selectivity, making them a promising candidate for use in carbon capture applications. Moreover, we investigate the effect of various parameters such as temperature, and pressu
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show More