In this paper a new series of morpholine derivatives was prepared by reacting the morpholine with ethyl chloro acetate in the presence triethylamine as a catalyst in benzene gave morpholin-N-ethyl acetate(1) which reacted with hydrazine hydrate in ethanol, and gave morpholin-N-ethyl acetohydrazide (2) . Morpholin-N-aceto semithiocarbazide (3) were prepared by reacting compound(2) with ammonium thiocyanate , concentrated hydrochloric acid and ethanol as a solvent .Compound (3) reacted with sodium hydroxide and hydrochloric acid to give 5-(morpholin-N-methylene)-1H-1,2,4-triazole-3-thiol (4) .The new series of 1,2,4-triazol derivatives (5-8) was synthesized by reaction of compound(4) with formaldehyde , DMF as a solvent and different secondary amines. Preparation of new 1,2,4-triazoline derivatives (9) by reaction compound (4) with bromo acetic acid . Reaction of compound (9) with different aromatic aldehyde and dimethyl sulfoxide as a solvent obtained compounds (10-13).
The accuracy of the skillful performance of the front and back dimensions of badminton in volleyball, occurs through the investment of complex exercises (physical skills) in a single performance and its characteristics that give the correct movement behavior and speed to the accuracy of the performance of the strokes as well as the identification of changes in some physiological indicators of By using these compound exercises. The research problem lies: I found a weakness in the accuracy of the performance of the front and back dimensions strike and diagnosed this through the tests that it conducted on the players to identify and know the problem, and attributed this weakness to a weakness in the necessary physical and skill abilities and t
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This study has three parts, the first one is the synthesis of a novel Schiff bases by the condensation of guanine or 9-[{2-hydroxyethoxy}methyl]-9H-guanine with variety aldehydes to yield four different bases as follows: (E)-2-((4-nitrobenzylidene)amino)-1,9-dihydro-6H-purin-6-one (S1), (E)-2-((4-methoxybenzylidene)amino)-1,9-dihydro-6H-purin-6-one (S2), (E)-2-((2-hydroxybenzylidene) amino)-9-((2-hydroxy ethoxy)methyl)-1,9-dihydro-6H-purin-6-one (S3), and (E)-2-(((9-((2-hydroxy ethoxy)methyl)-6-oxo-6,9-dihydro-1H-purin-2-yl)imino)methyl)benzoic acid (S4). Then, spectroscopic analyses such as Elemental Analysis, UV/VIS, Mass spectra, FTIR, 1H,13C-NMR were made to recognize these bases. In the second part, the ability of synthesized bases to
... Show MoreThe aim of this paper is to introduce and study the notion type of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where j = {δ, θ, α, p, s, b, β}.
الأثر V بالنسبة إلى sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي
... Show MoreIn this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B
... Show MoreThis study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that functions as an act over S if and only if functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following, is acting over S if and only if is a module where T is a nilpotent operator, is a
... Show MoreThis study aims at finding out the sentimental smartness of the kindergarten children
and its relationship with some variables.
1- The level of the sentimental smartness of the kindergarten children.
2- Investigating the Zero hypothesis in that there are no significant statistical differences in
the sentimental smartness between the kindergarten children according to the sex variables
(males and females).
Some statistical tools have been used in order to arrive at the results that verify the
hypotheses of this study. The researcher uses (1) the distinctive power between two
distinctive groups; (2) the relationship between the item and the total degree (Pearson
correlation factor); and (3) Elfakronbach formula t
Some responses to ancient grammarians
And contemporary researchers
In monograms
Set dietary program for some of dietary supplements and training for badminton young players, and identifying effect of taking some of the dietary supplementary for badminton young players. The research population :( badminton young players group (Arminian club). For age group (16-18) years the sample is divided in to two experimental groups within each group (6) players, and two for the exploratory experiment which was within the research sample, they were divided in to two groups, the first group take some of the dietary supplements (multivitamin creating) .the set exercises by the researchers in the main part of the training unit and the second group (amino acids, vitamins) and the set exercises by the researcher. The scientific approach
... Show More