Coumarin is a natural substance isolated from different plants. It belonges to a group of benzobyrones which consists of a benzene ring joined to a pyrone nucleus. In the present research, a new series of coumarin derivatives were formed. Compound (1) (7-hydroxy-4-methyl Coumarin) was converted into 4-methylquinolin-2(H) derivative (2) by reaction with acetamide, and then reaction of (2) with thiosemicarbazide in ethanol leads to the synthesize of hydrazincarbothioamide derivative (3).The reaction of (3) with ethylchloroacetate in presence of sodium acetate leads to closure ring to get [(1-(5-oxo-2-thioxoimidazolidin-1-ylimino) ethyl)]quinolin-2(1H)-one (4). Mannich bases were prepared through the reaction of (4) with primary amines to form compounds (5-6). New coumarin derivatives were characterized by their physical properties and various spectral analysis like: FTIR, 1HNMR spectra and GC-Mass spectrum for some of them.
The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper deals with constructing mixed probability distribution from mixing exponential
fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreIn this paper, a new seven-parameter Mittag-Leffler function of a single com-plex variable is proposed as a generalization of the standard Mittag-Leffler function, certain generalizations of Mittag-Leffler function, hypergeometric function and confluent hypergeometric function. Certain essential analytic properties are mainly discussed, such as radius of convergence, order, type, differentiation, Mellin-Barnes integral representation and Euler transform in the complex plane. Its relation to Fox-Wright function and H-function is also developed.
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreAlthough G6PD deficiency is the most common genetically determined blood disorder among Iraqis, its molecular basis has only recently been studied among the Kurds in North Iraq, while studies focusing on Arabs in other parts of Iraq are still absent.
A total of 1810 apparently healthy adult male blood donors were randomly recruited from the national blood transfusion center in Baghdad. They were classified into G6PD deficient and non-deficient individuals based on the results of methemoglobin reduction test (MHRT), with confirmation of deficiency by subsequent enzyme assays. DNA from defi
Tin dioxide (SnO2) were mixed with (TiO2 and CuO) with concentration ratio (50, 60, 70, 80 and 90) wt% films deposited on single crystal Si and glass substrates at (523 K) by spray pyrolysis technique from aqueous solutions containing tin (II) dichloride Dihydrate (SnCl2, 2H2O), dehydrate copper chloride (CuCl2.2H2O) and Titanium(III) chloride (TiCl3) with molarities (0.2 M). The results of electrical properties and analysis of gas sensing properties of films are presented in this report. Hall measurement showed that films were n-type converted to p- type as titanium and copper oxide added at (50) % ratio. The D.C conductivity measurements referred that there are two mechanisms responsible about the conductivity, hence it possess two act
... Show MoreThe CenomanianÐEarly Turonian reservoirs of the Mishrif Formation of the Mesopotamian Basin hold more than one-third of the proven Iraqi oil reserves. Difficulty in predicting the presence of these mostly rudistic reservoir units is mainly due to the complex paleogeography of the Mishrif depositional basin, which has not been helped by numerous previous studies using differing facies schemes over local areas. Here we present a regional microfacies-based study that incorporates earlier data into a comprehensive facies model. This shows that extensive accumulation of rudist banks usually occurred along an exterior shelf margin of the basin along an axis that runs from Hamrin to Badra a
Background: Hyperthyroidism refers to overactive of thyroid gland leading to excessive synthesis of thyroid hormones and accelerated metabolism in the peripheral tissue. Objective: The aim of this study is to evaluate a new member of the IL-1 super family of cytokines interleukin-33(IL-33) levels in serum .in order to evaluate its utility as clinical bio marker of autoimmune disease (i.e. hyperthyroidism) Methods: The present study was conducted on 30 patients from the Iraqi female patients with hyperthyroidism attending Baghdad teaching hospital, in addition to 30 healthy controls. All subjects were (35-65) years old. Parameters measured in the sera of patients and healthy groups, were interleukin -33 (IL-33), Thyroxin (T4), Thyroxin (T3)
... Show More