Chloroacetamide derivatives (2a-g) have been prepared through reaction of chloroacetyl chloride(1) (which prepared by the reaction of chloroacetic acid with thionyl chloride) with primary aromatic amines and sulfa compounds to afford compounds (2a-g) which then reacted with p-hydroxy benzaldehyde via Williamson reaction to obtaine the new compounds 2-(4-formyl phenoxy)-N-aryl acetamide (3a-g). Finally , compounds (3a-g) will be use as a good synthon to prepare the Schiff bases represented by compounds 2-(4-aryliminophenoxy)-N-arylacetamide (4a-g). through , reaction with some primary aromatic amine. All the prepared compounds were investigated by the available physical and spectroscopic methods.
Abstract
In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreKE Sharquie, AA Noaimi, MS Abass, American Journal of Dermatology and Venereology, 2019 - Cited by 4